Chapter 7 Securing Information Systems
11) What is a
botnet?
A botnet is a network of autonomous malicious software
agents that are under the control of a bost commander. The network is created
by installing malware that exploits the vulnerabilities of the web servers,
operating systems, or applications to take control of the infected computers.
22) Describe some of
the main points of the Digital Agenda for Europe?
Digital Agenda Europe used to define the key role that
information and communication technologies will play in 2020. It is to open the
digital market in European. Hence, broadband speeds of 30Mbps will be available
to all European citizens by 2020, and implementation of measures to protect
privacy and the establishment of a well-functioning network of CERT to prevent
cybercrime and respond effectively to cyber attacks.
33) Explain how the
cyber attack can be carried out.
The cyber attack was performed using a variety of
technique ranging from simple individual ping commands and message flooding to
more sophisticated distributed denial of service (DDoS) attack. Hackers
coordinated the attack by using a large number of compromised servers organized
in the botnet distributed around the world. Botnet is created by installing
malware that exploits the vulnerabilities of the software and systems of
computer and take control of it. Once it infected, it becomes part of a network
of thousands of ‘zombies’, machines that are commanded to carry out the attack.
44) Describe some of
the weakness exploited by malware.
There are some weakness exploited by malware, one of
it is the security defects in software. Malware exploits defects in the sign of
the operating system, in applications or in browser pluggin such as Java and
Adobe Flash Player. Most systems contain bugs, or loopholes which may exploited
by malware.
Not only that, insecure design or user error also one
of the weakness exploited by malware. Originally, PC had to be booted from
floopy disks. Until recently, it was common for a computer to boot from an
external boot device by default. This meant that computer would, by default,
boot from a floopy disk, USB flash drive, or CD and malicious boot code could
be used to install malware or boot into a modified operating system. Autorun or
autoplay features may allow code to be automatically executed from external
disk drive without permissions.
Besides, over-privilleged users and over-privilleged
code cause malware allowed to modify internal structures of the system and
subvert the system.
No comments:
Post a Comment