Botnets

Read Complete Research Material

BOTNETS

BOTNETS

Botnets

Introduction

Botnet is a term used for a network of different computers connected through internet which are controlled by malicious software. The computers connected to it are known as “Bots”. The Bots are sometimes known as “Zombie Computers”. Botnets are basically threats to the security of the entire network system. These Malicious software's, better known as Malware, is the most sophisticated type of threat to an entire computer system. Malware is a simple code that is designed with purpose and intent to destroy, steal or to damage someone's data, computer system or a network. Malware is software that is written to do harm to the data that resides on a computer or a network, and is designed to secretly gain access to the system without the owner's knowledge or permission. Once it got installed, malware can run and stay resident on the system for a long time. This disruption, infection, or damage results in system degradation and performance and a loss of security. It can create a very worst condition for the person managing networks.

Botnets are the serious threat to the security of all Internet Service Providers (ISP). It can harm the online commerce, e-government, and online environment. The malicious controller of botnet can control the activities of such compromised devices through different communication channels using network protocols mainly HTTP & IRC. Botnets are the threats in many ways, they can harm us in different forms e.g. attacks of denial of service, click fraud, abuse of SMTP for spam, and for the stealing of financial information, serial numbers, such as credit or debit card numbers, and login ID's. To merely analyze and present the weaknesses of a defence would open the door for attackers and make their job easier. Thus, creating a defence mechanism against the new attack is equally important (Provos, 2008).

Discussion

Botnet Problem

Botnets problem is the biggest problem these days, faced by the professionals related to information technology & network management. This security plan is not a complete overhaul of current systems and methods used, but a plan to harden current security measures. An environmental scan conducted on the website, and it has shown that although security measures are being taken there can be some improvements to further protection in this investment, and reduce the chances of a malicious attack. Internet threats are not the only concerns. Physical security must be considered because mobile devices, laptops, are lost and stolen on a daily basis. Most mobile devices carry considerable amounts of sensitive or private information giving more reasons to protect these items. Computer expertise has distorted the limits between cyber warfare, cyber-terrorism, and cyber-crime. Officials in industry and government say that cyber crime and cyber forces can be rented from the criminal organization is a rising threat to security of the country, and the economy.

New and complex IT tools can work to create a state or revolutionary group remains unknown under direct Internet cyber attacks. Many experts believe that the events of the past conventional terrorism were associated with crime and computer vulnerabilities ...
Related Ads