logo

The Assignment on Information Security

   

Added on  2022-08-30

12 Pages832 Words36 Views
Running head: Information Security
Information Security
Name of the Student
Name of the University
Author Note

Information Security 1
Table of Contents
Question 1:.................................................................................................................................2
Question 2:.................................................................................................................................3
Reflection:................................................................................................................................10
References................................................................................................................................11

Information Security 2
Question 1:
The name threat that can ruin a company is botnet. A botnet is a collection of devices
those are connected by internet and it may include servers, personal computers, devices of
mobile and devices of internet of internet of things those are infected and controlled by a
common kind of malware. The users are often not aware of a botnet that is infecting the
system. There are various types of botnets. The botnets include Zeus, Srizbi, Methbot, Mirai
and many more.
The botnets can infect any type of devices those are connected wirelessly or directly
to the internet. Laptops, personal computers, and many such can be easily attacked by the
botnet. Due to the large growth of internet of things and it is bringing the devices online, the
cyber criminals have large opportunities to expand their botnets and expanding the level of
impact of the botnet on various companies (1).
Working of botnet: A bot is a device that is infected by a code that is malicious and
then it becomes a part of the network or of the devices, those are infected and a group of
attackers controls them. A botnet is also called a zombie. The malware of botnet looks for the
devices those are vulnerable across the internet and it does not the target any particular,
company, individuals or any industry. The aim for the creation of botnet is to contaminate the
devices those are connected to the internet and then utilise the power of computing and the
assets of the devices those are infected for the actions those are automated (2). It usually
remains hidden to the users that use the devices.
There are various mitigation strategies of botnet so that it does not attack the system any
more. The mitigation strategies include:
Updating the operating system of the computers system often
Avoiding the attachments of email from any sources those are suspicious or unknown

Information Security 3
Avoiding to click on the links those are suspicious
Installing a strong antivirus software on the computer system
Avoiding downloading the files from networks of file sharing
The phenomenon of botnet supports a broad range of criminal actions that includes
distributed denial of service attacks, click fraud, phishing and many more for illegal exchange
of materials and information. A cyber criminal in order to infect the devices and the websites
and to get hold of the personal information of a company or an individual can carry out these
attacks. This attack is not conducted by any state nations as this attack is to infect and obtain
sensitive information about an individual or a company.
I think that the mitigation strategy is needed in order to mitigate the botnet attack. I think
that the operating system of a computer must be updated and the patch must be downloaded
so that the botnets do not infect the machines. I think that the proper anti-malware softwares
must be installed in the system in order to detect the botnet attack. These mitigation strategies
are very important in order to resolve the attacks of botnets those are infecting the devices
and the websites those are connected to internet.
Question 2:
File encryption:

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
(PDF) Study of Botnets and their threats to Internet Security
|8
|1126
|478

Method to Detect and Mitigate Data
|13
|2575
|61

Botnet operations and communication
|12
|2233
|40

Information Security: Analysis of Mirai Botnet Malware Attack on Edimax Cameras
|16
|3642
|383

Computer Criminals, IoT, CRM and Communication Methods for Organizations
|10
|3100
|491

Assignment on Trends in Cybercrime
|13
|3063
|21