Question 1: What is a botnet?
A botnet is network of autonomous malicious software agents that are under control of a bot commander.
Question 2: Digital Agenda of Europe main points?
a. To define the key role that information and communication technologies in year 2020.
b. To initiate calls for a single open European digital market.
c. To have broadband speeds of 30Mbps be available to all European citizens by 2020.
d. To implement measures to protect privacy and establishment of well function network of Computer Emergency Response Teams(CERT) to prevent cybercrime and respond effectively to cyber attacks.
Question 3: How a cyber attack can be carried out?
From a simple individual ping commands and message flooding to more sophisticated distributed denial of service (DDoS) attacks. Hacking is coordinated by using a large number of compromised servers organized in a botnet distributed around the world.
Using botnet :
Network is created by installing malware that exploits the vulnerabilities of Web servers, operating systems, or applications to take control of the infected computers. Once computer is infected, it becomes part of network of thousands of zombies machines that are commanded to carry out the attack.
Conflicker worm :
Downloaded and install other malware from controlled web sites, thus infected computers would be under full control of the hackers.
Stuxnet :
Propagated via USB devices with hidden shortcuts to execute programs with extensions of .Ink automatically when content of an infected USB drive was displayed. Worm is also capable of installing other malware.
Question 4: Describe some of the weaknesses exploited by malware.
There are a few of weaknesses exploited by malware. Firstly, once installed on a computer , Conflicker is able to download and install other malware from controlled Web sites, thus infected computers could be under full control of the hackers.
Secondly, the malware known as Stuxnet, infected Windows PCs running the Supervisory Control and Data Acquisitions (SCADA) control system from the German company Siemens. Stuxnet was propagated via USB devices. The malware, hidden in shortcuts to executable programs was executed automatically when the content of an infected USB drive was displayed.
Thirdly, the worm was capable installing other malware. Initially, security experts disclosed that Stuxnet was designed to steal industrial secrets from SIMATIC WinCC, a visualization and control software system from Siemens.
This article is really helpful for me. I am regular visitor to this blog. Share such kind of article more in future. Personally i like this article a lot and you can have a look at my services also: I was seriously search for a Salesforce training institutes in ameerpet which offer job assistance and Salesforce training institutes in Hyderabad who are providing certification material. It's worth to join Salesforce training institutes in India because of their real time projects material and 24x7 support from customer desk. You can easily find the best Salesforce training institutes in kukatpally kphb which are also a part of Pega training institutes in hyderabad. This is amazing to join Data science training institutes in ameerpet who are quire popular with Selenium training institutes in ameerpet and trending coureses like Java training institutes in ameerpet and data science related programming coures python training institutes in ameerpet If you want HCM course then this workday training institutes in ameerpet is best for you to get job on workday.
ReplyDelete