SlideShare a Scribd company logo
1 of 33
Botnet attack is where group of devices are infected by malware
that lets the hacker to manipulate these devices which are
connected internally by internet within an organization. Botnet
attack can destroy personal and enterprise identity. Initially
botnet will attack an individual and eventually an organization.
Botnet will gain access to an individual system and build its
chain to strengthen the network like infecting more systems,
electronic devices and network devices. These devices
eventually will be controlled by the hacker. These devices are
now called as bot. These army of bots will help botnet to
achieve hackers’ goal such as data theft. Few potential threats
are data breach. The organization can lose its confidential data
related to organization, organization policies, employee,
customers and organizations business strategy. As we know how
important and confidential the data is for an organization. This
article says that in 2014 few companies (like Microsoft and
Symantec) has identified 19 botnet groups which controlled
more than trillions of bots (Shirazi, 2015). Various
organizations spent millions of dollars to build secure and safe
environment. But using these bots, botnet can still break the
security to gain access to the data. This can cause huge damage
to an organization economically and destroy its reputation.
Reference:
Shirazi, R. (2015). Botnet takedown initiatives: A taxonomy and
performance model. Technology Innovation Management
Review, 5(1), 15-20. Retrieved from
https://search.proquest.com/docview/1676102254?accountid=10
378
14 hours ago
Karishma Paleja
Threats of Botnet Attack
COLLAPSE
Top of Form
In present world scenario Botnets can be responsible for a lot
of damage which can be constrained by remotely by an
assailant. Disavowals can be installed utilizing botnets for
sending Spam or Phishing messages. furthermore they can be
deployed for major identity theft or different maltreatment of
traded off machines(Thorsten and Niels, 2007). A bot is
introduced on a framework after a trade off and with a remote
control component it very well may be worked remotely by an
assailant by giving some self-assertive orders subsequently
overseeing the casualty's framework (Thorsten and Niels, 2007).
Five elements that include botnet assault: botnet administrator,
botnet controller, assortment of bots, botnet programming drop,
botnet target (Edward, 2012).
The above is the base for an assassin used to frame a system of
commercial machines engaged to control framework along these
lines an assassin can control enormous number of machines
utilizing bots simultaneously.A botnet is framed in way to
consolidate few more bots and with an effective intrusion,
strategic framework can be constrained by an attacker and
portrayal of bots can be characterized with three properties: a
remote control office, execution of a few orders and spreading
instrument for additional engendering (Thorsten and Niels,
2007).
Looking into the insights effecting the each trait, governing a
bot remotely is achieved by mindfully incorporating the focal
IRC server for discipline and control. In case of concealed tasks
they use DNS burrow rather of IRC convention. DDoS and
updates are two sorts of orders for SYN and UDP flooding and
spreading instrument resembles worm where a bot examines the
entire system ranges for vulnerabilities and proliferates
themselves (Thorsten and Niels, 2007).
References:
Thorsten Holz & Niels Provos. (2015). Virtual Honeypots:
Botnet Tracking to Intrusion Detection. Addison-Wesley
Professional,2007
Edward G.Amoroso.
Bottom of Form
11
Copyright © 2012, Elsevier Inc.
All Rights Reserved
Chapter 1
Introduction
Cyber Attacks
Protecting National Infrastructure, 1st ed.
2
• National infrastructure
– Refers to the complex, underlying delivery and support
systems for all large-scale services considered absolutely
essential to a nation
• Conventional approach to cyber security not enough
• New approach needed
– Combining best elements of existing security techniques
with challenges that face complex, large-scale national
services
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 1
–
In
tro
d
u
c
tio
n
Introduction
3
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 1
–
In
tro
d
u
c
tio
n
Fig. 1.1 – National infrastructure
cyber and physical attacks
4
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 1
–
In
tro
d
u
c
tio
n
Fig. 1.2 – Differences between
small- and large-scale cyber security
5
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 1
–
In
tro
d
u
c
tio
n• Three types of malicious adversaries
– External adversary
– Internal adversary
– Supplier adversary
National Cyber Threats,
Vulnerabilities, and Attacks
6
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 1
–
In
tro
d
u
c
tio
n
Fig. 1.3 – Adversaries and
exploitation points in national
infrastructure
7
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 1
–
In
tro
d
u
c
tio
n• Three exploitation points
– Remote access
– System administration and normal usage
– Supply chain
National Cyber Threats,
Vulnerabilities, and Attacks
8
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 1
–
In
tro
d
u
c
tio
n• Infrastructure threatened by most common security
concerns:
– Confidentiality
– Integrity
– Availability
– Theft
National Cyber Threats,
Vulnerabilities, and Attacks
9
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 1
–
In
tro
d
u
c
tio
n
Botnet Threat
• What is a botnet attack?
– The remote collection of compromised end-user machines
(usually broadband-connected PCs) is used to attack a
target.
– Sources of attack are scattered and difficult to identify
– Five entities that comprise botnet attack: botnet operator,
botnet controller, collection of bots, botnot software drop,
botnet target
10
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 1
–
In
tro
d
u
c
tio
n
• Five entities that comprise botnet attack:
– Botnet operator
– Botnet controller
– Collection of bots
– Botnot software drop
– Botnet target
• Distributed denial of service (DDOS) attack: bots
create “cyber traffic jam”
Botnet Threat
11
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 1
–
In
tro
d
u
c
tio
n
Fig. 1.4 – Sample DDOS attack from a
botnet
12
National Cyber Security
Methodology Components
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 1
–
In
tro
d
u
c
tio
n• Ten basic design and operation principles:
– Deception – Discretion
– Separation – Collection
– Diversity – Correlation
– Commonality – Awareness
– Depth – Response
13
• Deliberately introducing misleading functionality or
misinformation for the purpose of tricking an
adversary
– Computer scientists call this functionality a honey pot
• Deception enables forensic analysis of intruder
activity
• The acknowledged use of deception may be a
deterrent to intruders (every vulnerability may
actually be a trap)
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 1
–
In
tro
d
u
c
tio
n
Deception
14
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 1
–
In
tro
d
u
c
tio
n
Fig. 1.5 – Components of an interface
with deception
15
• Separation involves enforced access policy
restrictions on users and resources in a computing
environment
• Most companies use enterprise firewalls, which are
complemented by the following:
– Authentication and identity management
– Logical access controls
– LAN controls
– Firewalls
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 1
–
In
tro
d
u
c
tio
n
Separation
16
Fig. 1.6 – Firewall enhancements for
national infrastructure
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 1
–
In
tro
d
u
c
tio
n
17
• Diversity is the principle of using technology and
systems that are intentionally different in substantive
ways.
• Diversity hard to implement
– A single software vendor tends to dominate the PC
operating system business landscape
– Diversity conflicts with organizational goals of simplifying
supplier and vendor relationships
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 1
–
In
tro
d
u
c
tio
n
Diversity
18
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 1
–
In
tro
d
u
c
tio
n
Fig. 1.7 – Introducing diversity to
national infrastructure
19
• Consistency involves uniform attention to security
best practices across national infrastructure
components
• Greatest challenge involves auditing
• A national standard is needed
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 1
–
In
tro
d
u
c
tio
n
Commonality
20
• Depth involves using multiple security layers to
protect national infrastructure assets
• Defense layers are maximized by using a combination
of functional and procedural controls
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 1
–
In
tro
d
u
c
tio
n
Depth
21
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 1
–
In
tro
d
u
c
tio
n
Fig. 1.8 – National infrastructure
security through defense in depth
22
• Discretion involves individuals and groups making
good decisions to obscure sensitive information
about national infrastructure
• This is not the same as “security through obscurity”
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 1
–
In
tro
d
u
c
tio
n
Discretion
23
• Collection involves automated gathering of system-
related information about national infrastructure to
enable security analysis
• Data is processed by a security information
management system.
• Operational challenges
– What type of information should be collected?
– How much information should be collected?
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 1
–
In
tro
d
u
c
tio
n
Collection
24
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 1
–
In
tro
d
u
c
tio
n
Fig. 1.9 – Collecting national
infrastructure-related security
information
25
• Correlation involves a specific type of analysis that
can be performed on factors related to national
infrastructure protection
– This type of comparison-oriented analysis is indispensable
• Past initiatives included real-time correlation of data
at fusion center
– Difficult to implement
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 1
–
In
tro
d
u
c
tio
n
Correlation
26
Fig. 1.10 – National infrastructure high-
level correlation approach
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 1
–
In
tro
d
u
c
tio
n
27
• Awareness involves an organization understanding
the differences between observed and normal status
in national infrastructure
• Most agree on the need for awareness, but how can
awareness be achieved?
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 1
–
In
tro
d
u
c
tio
n
Awareness
28
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 1
–
In
tro
d
u
c
tio
n
Fig. 1.11 – Real-time situation
awareness process flow
29
• Response involves the assurance that processes are
in place to react to any security-related indicator
– Indicators should flow from the awareness layer
• Current practice in smaller corporate environments
of reducing “false positives” by waiting to confirm
disaster is not acceptable for national infrastructure
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 1
–
In
tro
d
u
c
tio
n
Response
30
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 1
–
In
tro
d
u
c
tio
n
Fig. 1.12 – National infrastructure
security response approach
31
• Commissions and groups
• Information sharing
• International cooperation
• Technical and operational costs
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 1
–
In
tro
d
u
c
tio
n
Implementing the Principles
Nationally

More Related Content

Similar to Botnet attack is where group of devices are infected by malware th.docx

Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security
Harish Chaudhary
 
The Comprehensive Security Policy In The Trojan War
The Comprehensive Security Policy In The Trojan WarThe Comprehensive Security Policy In The Trojan War
The Comprehensive Security Policy In The Trojan War
Mandy Cross
 

Similar to Botnet attack is where group of devices are infected by malware th.docx (20)

ControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdf
ControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdfControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdf
ControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdf
 
Cyber.pptx
Cyber.pptxCyber.pptx
Cyber.pptx
 
Presentation given at Bio-IT World 2016 as a Senior Member of the IEEE on the...
Presentation given at Bio-IT World 2016 as a Senior Member of the IEEE on the...Presentation given at Bio-IT World 2016 as a Senior Member of the IEEE on the...
Presentation given at Bio-IT World 2016 as a Senior Member of the IEEE on the...
 
IRJET- A Review on Honeypots
IRJET-  	  A Review on HoneypotsIRJET-  	  A Review on Honeypots
IRJET- A Review on Honeypots
 
Secure your Space: The Internet of Things
Secure your Space: The Internet of ThingsSecure your Space: The Internet of Things
Secure your Space: The Internet of Things
 
Safeguarding the Internet of Things
Safeguarding the Internet of ThingsSafeguarding the Internet of Things
Safeguarding the Internet of Things
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
Honey Pot Intrusion Detection System
 
EFFECTIVE MALWARE DETECTION APPROACH BASED ON DEEP LEARNING IN CYBER-PHYSICAL...
EFFECTIVE MALWARE DETECTION APPROACH BASED ON DEEP LEARNING IN CYBER-PHYSICAL...EFFECTIVE MALWARE DETECTION APPROACH BASED ON DEEP LEARNING IN CYBER-PHYSICAL...
EFFECTIVE MALWARE DETECTION APPROACH BASED ON DEEP LEARNING IN CYBER-PHYSICAL...
 
Effective Malware Detection Approach based on Deep Learning in Cyber-Physical...
Effective Malware Detection Approach based on Deep Learning in Cyber-Physical...Effective Malware Detection Approach based on Deep Learning in Cyber-Physical...
Effective Malware Detection Approach based on Deep Learning in Cyber-Physical...
 
Challenges2013
Challenges2013Challenges2013
Challenges2013
 
E04 05 2841
E04 05 2841E04 05 2841
E04 05 2841
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security
 
Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...
Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...
Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...
 
Common Techniques To Identify Advanced Persistent Threat (APT)
Common Techniques To Identify Advanced Persistent Threat (APT)Common Techniques To Identify Advanced Persistent Threat (APT)
Common Techniques To Identify Advanced Persistent Threat (APT)
 
IRJET- Cross Platform Penetration Testing Suite
IRJET-  	  Cross Platform Penetration Testing SuiteIRJET-  	  Cross Platform Penetration Testing Suite
IRJET- Cross Platform Penetration Testing Suite
 
The Comprehensive Security Policy In The Trojan War
The Comprehensive Security Policy In The Trojan WarThe Comprehensive Security Policy In The Trojan War
The Comprehensive Security Policy In The Trojan War
 
IRJET-Detecting Hacker Activities using Honeypot
IRJET-Detecting Hacker Activities using HoneypotIRJET-Detecting Hacker Activities using Honeypot
IRJET-Detecting Hacker Activities using Honeypot
 

More from hartrobert670

BUS M02C – Managerial Accounting SLO Assessment project .docx
BUS M02C – Managerial Accounting SLO Assessment project .docxBUS M02C – Managerial Accounting SLO Assessment project .docx
BUS M02C – Managerial Accounting SLO Assessment project .docx
hartrobert670
 
BUS 409 – Student Notes(Prerequisite BUS 310)COURSE DESCR.docx
BUS 409 – Student Notes(Prerequisite BUS 310)COURSE DESCR.docxBUS 409 – Student Notes(Prerequisite BUS 310)COURSE DESCR.docx
BUS 409 – Student Notes(Prerequisite BUS 310)COURSE DESCR.docx
hartrobert670
 
BUS LAW2HRM Management Discussion boardDis.docx
BUS LAW2HRM Management Discussion boardDis.docxBUS LAW2HRM Management Discussion boardDis.docx
BUS LAW2HRM Management Discussion boardDis.docx
hartrobert670
 
BUS 571 Compensation and BenefitsCompensation Strategy Project.docx
BUS 571 Compensation and BenefitsCompensation Strategy Project.docxBUS 571 Compensation and BenefitsCompensation Strategy Project.docx
BUS 571 Compensation and BenefitsCompensation Strategy Project.docx
hartrobert670
 
BUS 475 – Business and Society© 2014 Strayer University. All Rig.docx
BUS 475 – Business and Society© 2014 Strayer University. All Rig.docxBUS 475 – Business and Society© 2014 Strayer University. All Rig.docx
BUS 475 – Business and Society© 2014 Strayer University. All Rig.docx
hartrobert670
 
BUS 210 Exam Instructions.Please read the exam carefully and a.docx
BUS 210 Exam Instructions.Please read the exam carefully and a.docxBUS 210 Exam Instructions.Please read the exam carefully and a.docx
BUS 210 Exam Instructions.Please read the exam carefully and a.docx
hartrobert670
 
BUS 137S Special Topics in Marketing (Services Marketing)Miwa Y..docx
BUS 137S Special Topics in Marketing (Services Marketing)Miwa Y..docxBUS 137S Special Topics in Marketing (Services Marketing)Miwa Y..docx
BUS 137S Special Topics in Marketing (Services Marketing)Miwa Y..docx
hartrobert670
 
BUS 313 – Student NotesCOURSE DESCRIPTIONThis course intro.docx
BUS 313 – Student NotesCOURSE DESCRIPTIONThis course intro.docxBUS 313 – Student NotesCOURSE DESCRIPTIONThis course intro.docx
BUS 313 – Student NotesCOURSE DESCRIPTIONThis course intro.docx
hartrobert670
 
BUS 1 Mini Exam – Chapters 05 – 10 40 Points S.docx
BUS 1 Mini Exam – Chapters 05 – 10 40 Points S.docxBUS 1 Mini Exam – Chapters 05 – 10 40 Points S.docx
BUS 1 Mini Exam – Chapters 05 – 10 40 Points S.docx
hartrobert670
 
BullyingIntroductionBullying is defined as any for.docx
BullyingIntroductionBullying is defined as any for.docxBullyingIntroductionBullying is defined as any for.docx
BullyingIntroductionBullying is defined as any for.docx
hartrobert670
 
BUS1001 - Integrated Business PerspectivesCourse SyllabusSch.docx
BUS1001 - Integrated Business PerspectivesCourse SyllabusSch.docxBUS1001 - Integrated Business PerspectivesCourse SyllabusSch.docx
BUS1001 - Integrated Business PerspectivesCourse SyllabusSch.docx
hartrobert670
 
BUMP implementation in Java.docxThe project is to implemen.docx
BUMP implementation in Java.docxThe project is to implemen.docxBUMP implementation in Java.docxThe project is to implemen.docx
BUMP implementation in Java.docxThe project is to implemen.docx
hartrobert670
 
BUS 303 Graduate School and Further Education PlanningRead and w.docx
BUS 303 Graduate School and Further Education PlanningRead and w.docxBUS 303 Graduate School and Further Education PlanningRead and w.docx
BUS 303 Graduate School and Further Education PlanningRead and w.docx
hartrobert670
 
Bulletin Board Submission 10 Points. Due by Monday at 900 a.m..docx
Bulletin Board Submission 10 Points. Due by Monday at 900 a.m..docxBulletin Board Submission 10 Points. Due by Monday at 900 a.m..docx
Bulletin Board Submission 10 Points. Due by Monday at 900 a.m..docx
hartrobert670
 
BUS 371Fall 2014Final Exam – Essay65 pointsDue Monda.docx
BUS 371Fall 2014Final Exam – Essay65 pointsDue  Monda.docxBUS 371Fall 2014Final Exam – Essay65 pointsDue  Monda.docx
BUS 371Fall 2014Final Exam – Essay65 pointsDue Monda.docx
hartrobert670
 
Burn with Us Sacrificing Childhood in The Hunger GamesSus.docx
Burn with Us Sacrificing Childhood in The Hunger GamesSus.docxBurn with Us Sacrificing Childhood in The Hunger GamesSus.docx
Burn with Us Sacrificing Childhood in The Hunger GamesSus.docx
hartrobert670
 
BUS 305 SOLUTIONS TOPRACTICE PROBLEMS EXAM 21) B2) B3.docx
BUS 305 SOLUTIONS TOPRACTICE PROBLEMS EXAM 21) B2) B3.docxBUS 305 SOLUTIONS TOPRACTICE PROBLEMS EXAM 21) B2) B3.docx
BUS 305 SOLUTIONS TOPRACTICE PROBLEMS EXAM 21) B2) B3.docx
hartrobert670
 
Burgerville- Motivation Goals.Peer-reviewed articles.Here ar.docx
Burgerville- Motivation Goals.Peer-reviewed articles.Here ar.docxBurgerville- Motivation Goals.Peer-reviewed articles.Here ar.docx
Burgerville- Motivation Goals.Peer-reviewed articles.Here ar.docx
hartrobert670
 
Bullying Bullying in Schools PaperName.docx
Bullying     Bullying in Schools PaperName.docxBullying     Bullying in Schools PaperName.docx
Bullying Bullying in Schools PaperName.docx
hartrobert670
 
Building Design and Construction FIRE 1102 – Principle.docx
Building Design and Construction FIRE 1102 – Principle.docxBuilding Design and Construction FIRE 1102 – Principle.docx
Building Design and Construction FIRE 1102 – Principle.docx
hartrobert670
 

More from hartrobert670 (20)

BUS M02C – Managerial Accounting SLO Assessment project .docx
BUS M02C – Managerial Accounting SLO Assessment project .docxBUS M02C – Managerial Accounting SLO Assessment project .docx
BUS M02C – Managerial Accounting SLO Assessment project .docx
 
BUS 409 – Student Notes(Prerequisite BUS 310)COURSE DESCR.docx
BUS 409 – Student Notes(Prerequisite BUS 310)COURSE DESCR.docxBUS 409 – Student Notes(Prerequisite BUS 310)COURSE DESCR.docx
BUS 409 – Student Notes(Prerequisite BUS 310)COURSE DESCR.docx
 
BUS LAW2HRM Management Discussion boardDis.docx
BUS LAW2HRM Management Discussion boardDis.docxBUS LAW2HRM Management Discussion boardDis.docx
BUS LAW2HRM Management Discussion boardDis.docx
 
BUS 571 Compensation and BenefitsCompensation Strategy Project.docx
BUS 571 Compensation and BenefitsCompensation Strategy Project.docxBUS 571 Compensation and BenefitsCompensation Strategy Project.docx
BUS 571 Compensation and BenefitsCompensation Strategy Project.docx
 
BUS 475 – Business and Society© 2014 Strayer University. All Rig.docx
BUS 475 – Business and Society© 2014 Strayer University. All Rig.docxBUS 475 – Business and Society© 2014 Strayer University. All Rig.docx
BUS 475 – Business and Society© 2014 Strayer University. All Rig.docx
 
BUS 210 Exam Instructions.Please read the exam carefully and a.docx
BUS 210 Exam Instructions.Please read the exam carefully and a.docxBUS 210 Exam Instructions.Please read the exam carefully and a.docx
BUS 210 Exam Instructions.Please read the exam carefully and a.docx
 
BUS 137S Special Topics in Marketing (Services Marketing)Miwa Y..docx
BUS 137S Special Topics in Marketing (Services Marketing)Miwa Y..docxBUS 137S Special Topics in Marketing (Services Marketing)Miwa Y..docx
BUS 137S Special Topics in Marketing (Services Marketing)Miwa Y..docx
 
BUS 313 – Student NotesCOURSE DESCRIPTIONThis course intro.docx
BUS 313 – Student NotesCOURSE DESCRIPTIONThis course intro.docxBUS 313 – Student NotesCOURSE DESCRIPTIONThis course intro.docx
BUS 313 – Student NotesCOURSE DESCRIPTIONThis course intro.docx
 
BUS 1 Mini Exam – Chapters 05 – 10 40 Points S.docx
BUS 1 Mini Exam – Chapters 05 – 10 40 Points S.docxBUS 1 Mini Exam – Chapters 05 – 10 40 Points S.docx
BUS 1 Mini Exam – Chapters 05 – 10 40 Points S.docx
 
BullyingIntroductionBullying is defined as any for.docx
BullyingIntroductionBullying is defined as any for.docxBullyingIntroductionBullying is defined as any for.docx
BullyingIntroductionBullying is defined as any for.docx
 
BUS1001 - Integrated Business PerspectivesCourse SyllabusSch.docx
BUS1001 - Integrated Business PerspectivesCourse SyllabusSch.docxBUS1001 - Integrated Business PerspectivesCourse SyllabusSch.docx
BUS1001 - Integrated Business PerspectivesCourse SyllabusSch.docx
 
BUMP implementation in Java.docxThe project is to implemen.docx
BUMP implementation in Java.docxThe project is to implemen.docxBUMP implementation in Java.docxThe project is to implemen.docx
BUMP implementation in Java.docxThe project is to implemen.docx
 
BUS 303 Graduate School and Further Education PlanningRead and w.docx
BUS 303 Graduate School and Further Education PlanningRead and w.docxBUS 303 Graduate School and Further Education PlanningRead and w.docx
BUS 303 Graduate School and Further Education PlanningRead and w.docx
 
Bulletin Board Submission 10 Points. Due by Monday at 900 a.m..docx
Bulletin Board Submission 10 Points. Due by Monday at 900 a.m..docxBulletin Board Submission 10 Points. Due by Monday at 900 a.m..docx
Bulletin Board Submission 10 Points. Due by Monday at 900 a.m..docx
 
BUS 371Fall 2014Final Exam – Essay65 pointsDue Monda.docx
BUS 371Fall 2014Final Exam – Essay65 pointsDue  Monda.docxBUS 371Fall 2014Final Exam – Essay65 pointsDue  Monda.docx
BUS 371Fall 2014Final Exam – Essay65 pointsDue Monda.docx
 
Burn with Us Sacrificing Childhood in The Hunger GamesSus.docx
Burn with Us Sacrificing Childhood in The Hunger GamesSus.docxBurn with Us Sacrificing Childhood in The Hunger GamesSus.docx
Burn with Us Sacrificing Childhood in The Hunger GamesSus.docx
 
BUS 305 SOLUTIONS TOPRACTICE PROBLEMS EXAM 21) B2) B3.docx
BUS 305 SOLUTIONS TOPRACTICE PROBLEMS EXAM 21) B2) B3.docxBUS 305 SOLUTIONS TOPRACTICE PROBLEMS EXAM 21) B2) B3.docx
BUS 305 SOLUTIONS TOPRACTICE PROBLEMS EXAM 21) B2) B3.docx
 
Burgerville- Motivation Goals.Peer-reviewed articles.Here ar.docx
Burgerville- Motivation Goals.Peer-reviewed articles.Here ar.docxBurgerville- Motivation Goals.Peer-reviewed articles.Here ar.docx
Burgerville- Motivation Goals.Peer-reviewed articles.Here ar.docx
 
Bullying Bullying in Schools PaperName.docx
Bullying     Bullying in Schools PaperName.docxBullying     Bullying in Schools PaperName.docx
Bullying Bullying in Schools PaperName.docx
 
Building Design and Construction FIRE 1102 – Principle.docx
Building Design and Construction FIRE 1102 – Principle.docxBuilding Design and Construction FIRE 1102 – Principle.docx
Building Design and Construction FIRE 1102 – Principle.docx
 

Recently uploaded

Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
fonyou31
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Krashi Coaching
 

Recently uploaded (20)

Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 

Botnet attack is where group of devices are infected by malware th.docx

  • 1. Botnet attack is where group of devices are infected by malware that lets the hacker to manipulate these devices which are connected internally by internet within an organization. Botnet attack can destroy personal and enterprise identity. Initially botnet will attack an individual and eventually an organization. Botnet will gain access to an individual system and build its chain to strengthen the network like infecting more systems, electronic devices and network devices. These devices eventually will be controlled by the hacker. These devices are now called as bot. These army of bots will help botnet to achieve hackers’ goal such as data theft. Few potential threats are data breach. The organization can lose its confidential data related to organization, organization policies, employee, customers and organizations business strategy. As we know how important and confidential the data is for an organization. This article says that in 2014 few companies (like Microsoft and Symantec) has identified 19 botnet groups which controlled more than trillions of bots (Shirazi, 2015). Various organizations spent millions of dollars to build secure and safe environment. But using these bots, botnet can still break the security to gain access to the data. This can cause huge damage to an organization economically and destroy its reputation. Reference: Shirazi, R. (2015). Botnet takedown initiatives: A taxonomy and performance model. Technology Innovation Management Review, 5(1), 15-20. Retrieved from https://search.proquest.com/docview/1676102254?accountid=10 378
  • 2. 14 hours ago Karishma Paleja Threats of Botnet Attack COLLAPSE Top of Form In present world scenario Botnets can be responsible for a lot of damage which can be constrained by remotely by an assailant. Disavowals can be installed utilizing botnets for sending Spam or Phishing messages. furthermore they can be deployed for major identity theft or different maltreatment of traded off machines(Thorsten and Niels, 2007). A bot is introduced on a framework after a trade off and with a remote control component it very well may be worked remotely by an assailant by giving some self-assertive orders subsequently overseeing the casualty's framework (Thorsten and Niels, 2007). Five elements that include botnet assault: botnet administrator, botnet controller, assortment of bots, botnet programming drop, botnet target (Edward, 2012). The above is the base for an assassin used to frame a system of commercial machines engaged to control framework along these lines an assassin can control enormous number of machines utilizing bots simultaneously.A botnet is framed in way to consolidate few more bots and with an effective intrusion, strategic framework can be constrained by an attacker and portrayal of bots can be characterized with three properties: a remote control office, execution of a few orders and spreading instrument for additional engendering (Thorsten and Niels, 2007). Looking into the insights effecting the each trait, governing a bot remotely is achieved by mindfully incorporating the focal IRC server for discipline and control. In case of concealed tasks they use DNS burrow rather of IRC convention. DDoS and updates are two sorts of orders for SYN and UDP flooding and spreading instrument resembles worm where a bot examines the entire system ranges for vulnerabilities and proliferates themselves (Thorsten and Niels, 2007).
  • 3. References: Thorsten Holz & Niels Provos. (2015). Virtual Honeypots: Botnet Tracking to Intrusion Detection. Addison-Wesley Professional,2007 Edward G.Amoroso. Bottom of Form 11 Copyright © 2012, Elsevier Inc. All Rights Reserved Chapter 1 Introduction Cyber Attacks Protecting National Infrastructure, 1st ed. 2 • National infrastructure – Refers to the complex, underlying delivery and support systems for all large-scale services considered absolutely essential to a nation • Conventional approach to cyber security not enough
  • 4. • New approach needed – Combining best elements of existing security techniques with challenges that face complex, large-scale national services Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 1 – In tro d u c tio n Introduction 3
  • 5. Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 1 – In tro d u c tio n Fig. 1.1 – National infrastructure cyber and physical attacks 4 Copyright © 2012, Elsevier Inc. All rights Reserved C h
  • 6. a p te r 1 – In tro d u c tio n Fig. 1.2 – Differences between small- and large-scale cyber security 5 Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 1 –
  • 7. In tro d u c tio n• Three types of malicious adversaries – External adversary – Internal adversary – Supplier adversary National Cyber Threats, Vulnerabilities, and Attacks 6 Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 1 –
  • 8. In tro d u c tio n Fig. 1.3 – Adversaries and exploitation points in national infrastructure 7 Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 1 – In tro d
  • 9. u c tio n• Three exploitation points – Remote access – System administration and normal usage – Supply chain National Cyber Threats, Vulnerabilities, and Attacks 8 Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 1 – In tro d u
  • 10. c tio n• Infrastructure threatened by most common security concerns: – Confidentiality – Integrity – Availability – Theft National Cyber Threats, Vulnerabilities, and Attacks 9 Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 1 – In tro
  • 11. d u c tio n Botnet Threat • What is a botnet attack? – The remote collection of compromised end-user machines (usually broadband-connected PCs) is used to attack a target. – Sources of attack are scattered and difficult to identify – Five entities that comprise botnet attack: botnet operator, botnet controller, collection of bots, botnot software drop, botnet target 10 Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te
  • 12. r 1 – In tro d u c tio n • Five entities that comprise botnet attack: – Botnet operator – Botnet controller – Collection of bots – Botnot software drop – Botnet target • Distributed denial of service (DDOS) attack: bots create “cyber traffic jam” Botnet Threat 11 Copyright © 2012, Elsevier Inc.
  • 13. All rights Reserved C h a p te r 1 – In tro d u c tio n Fig. 1.4 – Sample DDOS attack from a botnet 12 National Cyber Security Methodology Components Copyright © 2012, Elsevier Inc. All rights Reserved C
  • 14. h a p te r 1 – In tro d u c tio n• Ten basic design and operation principles: – Deception – Discretion – Separation – Collection – Diversity – Correlation – Commonality – Awareness – Depth – Response 13 • Deliberately introducing misleading functionality or misinformation for the purpose of tricking an adversary – Computer scientists call this functionality a honey pot
  • 15. • Deception enables forensic analysis of intruder activity • The acknowledged use of deception may be a deterrent to intruders (every vulnerability may actually be a trap) Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 1 – In tro d u c tio n Deception 14
  • 16. Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 1 – In tro d u c tio n Fig. 1.5 – Components of an interface with deception 15 • Separation involves enforced access policy restrictions on users and resources in a computing environment • Most companies use enterprise firewalls, which are
  • 17. complemented by the following: – Authentication and identity management – Logical access controls – LAN controls – Firewalls Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 1 – In tro d u c tio n Separation
  • 18. 16 Fig. 1.6 – Firewall enhancements for national infrastructure Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 1 – In tro d u c tio n 17 • Diversity is the principle of using technology and systems that are intentionally different in substantive ways.
  • 19. • Diversity hard to implement – A single software vendor tends to dominate the PC operating system business landscape – Diversity conflicts with organizational goals of simplifying supplier and vendor relationships Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 1 – In tro d u c tio n Diversity
  • 20. 18 Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 1 – In tro d u c tio n Fig. 1.7 – Introducing diversity to national infrastructure 19 • Consistency involves uniform attention to security best practices across national infrastructure components
  • 21. • Greatest challenge involves auditing • A national standard is needed Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 1 – In tro d u c tio n Commonality 20 • Depth involves using multiple security layers to protect national infrastructure assets
  • 22. • Defense layers are maximized by using a combination of functional and procedural controls Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 1 – In tro d u c tio n Depth 21 Copyright © 2012, Elsevier Inc. All rights Reserved
  • 23. C h a p te r 1 – In tro d u c tio n Fig. 1.8 – National infrastructure security through defense in depth 22 • Discretion involves individuals and groups making good decisions to obscure sensitive information about national infrastructure • This is not the same as “security through obscurity” Copyright © 2012, Elsevier Inc. All rights Reserved
  • 24. C h a p te r 1 – In tro d u c tio n Discretion 23 • Collection involves automated gathering of system- related information about national infrastructure to enable security analysis • Data is processed by a security information management system. • Operational challenges – What type of information should be collected? – How much information should be collected?
  • 25. Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 1 – In tro d u c tio n Collection 24 Copyright © 2012, Elsevier Inc. All rights Reserved C h
  • 26. a p te r 1 – In tro d u c tio n Fig. 1.9 – Collecting national infrastructure-related security information 25 • Correlation involves a specific type of analysis that can be performed on factors related to national infrastructure protection – This type of comparison-oriented analysis is indispensable • Past initiatives included real-time correlation of data at fusion center – Difficult to implement Copyright © 2012, Elsevier Inc.
  • 27. All rights Reserved C h a p te r 1 – In tro d u c tio n Correlation 26 Fig. 1.10 – National infrastructure high- level correlation approach Copyright © 2012, Elsevier Inc. All rights Reserved C
  • 28. h a p te r 1 – In tro d u c tio n 27 • Awareness involves an organization understanding the differences between observed and normal status in national infrastructure • Most agree on the need for awareness, but how can awareness be achieved? Copyright © 2012, Elsevier Inc. All rights Reserved C h a
  • 29. p te r 1 – In tro d u c tio n Awareness 28 Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 1 – In
  • 30. tro d u c tio n Fig. 1.11 – Real-time situation awareness process flow 29 • Response involves the assurance that processes are in place to react to any security-related indicator – Indicators should flow from the awareness layer • Current practice in smaller corporate environments of reducing “false positives” by waiting to confirm disaster is not acceptable for national infrastructure Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 1 –
  • 31. In tro d u c tio n Response 30 Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 1 – In tro d u c
  • 32. tio n Fig. 1.12 – National infrastructure security response approach 31 • Commissions and groups • Information sharing • International cooperation • Technical and operational costs Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 1 – In tro d