10
TOPIC: BOTNET

Bot net

Embed Size (px)

Citation preview

Page 1: Bot net

TOPIC: BOTNET

Page 2: Bot net

WHAT IS BOTNET?

The word botnet is made up of two words: bot and net. Bot is short for robot, a name we sometimes give to a computer that is infected by malicious software.Net comes from network, a group of systems that are linked together.

Page 3: Bot net

HOW BOTS WORKAttacker creates a bot. Attaches it with a freeware software.Uploads it to peer to peer website from where users download software.When users install that software the virus automatically gets installed but user cannot actually see it.This virus notifies a success message to the attacker.Now attacker has full control of users computer.When multiple bots are made it becomes a network, BOTNET.

Page 4: Bot net

WHO IS BEHIND BOTNETS AND WHAT ARE BOTNETS USED FOR?

Botnets are used by malicious actors for various purposes, ranging from information theft to sending spam. As with everything else, the more resources you have, the faster you get results. Various types of people operate botnets. Criminal gangs use them to steal banking credentials and commit fraud, pranksters use them to spy on webcams and extort their victims.

Page 5: Bot net

IS THERE ANY SPECIFIC TYPE OR GROUP OF USERS THAT IS MORE VULNERABLE THAN THE REST?

Not really, there are various types of malware, each of which may be used to target a different group of users.

Page 6: Bot net

HISTORICALLY, WHAT ARE THE BEST KNOWN BOTNETS, THE BIGGEST AND THE WORST?

Conficker is probably the botnet that has received the most attention and it is certainly one of the biggest in history, with millions of hosts infected very quickly. This attracted attention from the research community which quickly organized a task force to fight it. As a result, the botnet was never used by its operators. Other significant botnets include Storm which was mainly used to send spam 

Page 7: Bot net

WHAT IS THE MOST EFFECTIVE APPROACH TO FIGHTING BOTNETS?

There are various ways to fight botnets, starting with anti-malware. We can spot infections in network traffic, in the memory of infected computers or on their hard drive.

I think the most effective approach to fighting botnets is education, by raising the awareness around this threat. We need to help everyone realize that if their computer is infected, it might be used to harm others. Thus, whenever an infected computer is found, it needs to be taken offline and cleaned as quickly as possible.

Page 8: Bot net

WHAT ARE THE BIGGEST RISKS FOR HOME USERS AND BUSINESSES WITH REGARDS TO BOTNETS?

The risks are varied: One can have sensitive information stolen from the electronic device, such as intellectual property, blueprints, or passwords giving access to sensitive resources (for example online games). Infected computers can also be used to overload servers or send spam.

Page 9: Bot net

PROTECT AGAINST BOTS Install top-rated security software (such as Norton 360) and 

Norton Internet Security. Configure your software's settings to update automatically. Increase the security settings on your browser. Limit your user rights when online. Never click on attachments unless you can verify the source. Ensure that your system is patched with the most current 

Microsoft Windows Update. Set your computer’s security settings to update automatically, to

ensure you always have the most current system patches.

Page 10: Bot net

CONCLUSION:

BotNets are most dangerous viruses for our computers. They can destroy our personal information or machine in a secret way. So we should take care of our Systems by installing latest security applications.