StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

The existence of botnets is the most serious threat to the information security today - Essay Example

Cite this document
Summary
The existence of botnets is the most serious threat to the information security today Introduction According to Hudak (nd), generally, a botnet is a set of computers that interact with one another through the Internet to perform a particular distributed task…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.4% of users find it useful
The existence of botnets is the most serious threat to the information security today
Read Text Preview

Extract of sample "The existence of botnets is the most serious threat to the information security today"

Download file to see previous pages

In other words, when one downloads bot software embedded in an email using a computer, the computer gets infected with the bot software and becomes part of the botnet. For a botnet to qualify as a botnet, it must always take action on a client machine through IRC channels, without the intervention of a bot herder. This means that the hacker (or group of hackers) need not personally log onto the client’s computer. Botnets usually are host to several threats as one package. Typically, the botnet is made up of the bot server and at least one botclients.

History of Botnets The origin of bots is associated with positive objectives, mainly to automate activities, the first real botnet being established in 1993. Botnets for example were used to run activities such as internet games, protect channels and perform conversions (Hudak, nd). Over time, the positive attributes evolved and started to be exploited for malicious purposes. Today, the negative activities carried out by botnets include sending of spam, controlling of client PCs against their wishes and to propagate viruses and worms.

Botnets first existed with DoS and DDoS with hackers creating better ways of managing the bots over time. From the traditional Command and Control (C&C) mechanism, botnets became transmitted signals based on P2P, IRC and HTTP according to Hudak (nd). The potential of botnets today cannot be understated. It is not uncommon for example for one botnet to consist of over 10,000 computers. It is also not rare to find a botnet consisting of over 400000 computers.The potential of having so many bots interconnected makes the potential of any botnet go beyond common imagination.

In fact, it is this potential that is normally harnessed by botmasters (whether with positive or negative intentions) to achieve their goals or accomplish goals fast and efficiently. How Botnets Work and What they are used for The establishment of a botnet depends on the existence of a hacker, a server and client computers. The hacker creates and transmits commands to a computer through a server. The server performs this function repeatedly thereby creating an army of bots that lie in the control of the botmaster.

Botnets having been created may be used for a myriad of activities including spamming, phishing, executing click fraud, transmitting Ad-ware as well as for Distributed Denial of Service (DDos) among pother purposes. In 1988 for example, a person by the name of Morris infected over 6,000 computers with Worm worm which represented about 10 percent of Fi (Schiller, 2007). The loss associated with this infection was approximated at between 10 and 100 million USD. Impact of Botnets on Information Security Those in favor of the establishment of botnets argue that botnets make work easier and is a creative way of making cash just like any other job (Schiller, 2007).

In consideration of the fact stated above, botnets have been used before to make mega kills by persons with malicious intentions as they seek financial motivation or publicity. It has, for example, been reported that Jeanson James in 2006 earned over 60,000 US dollars using a botnet of 400,000 computers that transmitted ad-ware. The amount of publicity that botnets draw to their creators is usually amazing when they are discovered. Apart from the economic benefits of botnets to their creators, a lot of harm is associated with their existence especially considering that a lot of important information is stored by individuals and

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“The existence of botnets is the most serious threat to the information Essay”, n.d.)
Retrieved from https://studentshare.org/environmental-studies/1420177-the-existence-of-botnets-is-the-most-serious
(The Existence of Botnets Is the Most Serious Threat to the Information Essay)
https://studentshare.org/environmental-studies/1420177-the-existence-of-botnets-is-the-most-serious.
“The Existence of Botnets Is the Most Serious Threat to the Information Essay”, n.d. https://studentshare.org/environmental-studies/1420177-the-existence-of-botnets-is-the-most-serious.
  • Cited: 0 times

CHECK THESE SAMPLES OF The existence of botnets is the most serious threat to the information security today

The Threat Emerging out of Distinct Composite Culture of Britain

Fundamental belief system inspired them, which has been a serious concern for the mainstream British today.... The opportunity of racial acceptance, religious tolerance, political understanding and economic support led Britain to face this serious question withering the belief that society that does not change gets extinction.... It bothers much on the issue of the ethnical minority whereas Britain believes in enrichment of lives through cosmopolitan outlook of human existence via eco-social aspect of its perception....
10 Pages (2500 words) Essay

The reation and Incidence of Nuclear Weapons

The paper will compare the articles written by John Muller and Robert Gallucci and discuss their viewpoints where Muller believes that nuclear weapons pose no threat to the world and Gallucci has stated that these weapons can be dangerous.... The reporter underlines that creation and incidence of Nuclear weapons have led them to be ranked as the most dangerous weapons to exist on earth which possess the ability to destroy an area as massive as an entire city....
5 Pages (1250 words) Essay

Human After the Historic Setback

The paper presents detailed information that he composite culture that is a gift of the historic tradition and cultural heritage comprise of all the liberal and modern elements of civility at times poses a question whether composite culture has perilous drawbacks.... The opportunity of racial acceptance, religious tolerance, political understanding and economic support led Britain to face this serious question withering the belief that society that does not change gets extinction....
10 Pages (2500 words) Term Paper

Cyberterrorism: What Is It

hellip; To aid the National Cyber security Division in carrying out its tasks, the federal government has created another agency in January 2003, the Terrorist Threat Integration Center (TTIC).... Krasarvin (2002) further pointed out that it was in 1997 that the term “cyberterrorism” was first pointed out by a senior research fellow at the Institute for security and Intelligence in California named Barry Collin....
17 Pages (4250 words) Research Proposal

Targets for Cyberterrorism

Krasarvin further pointed out that it was in 1997 that the term “cyberterrorism” was first pointed out by a senior research fellow at the Institute for security and Intelligence in California named Barry Collin.... This research will begin with the statement that there were many developments and discoveries during the 20th and 21st centuries, with rapid changes characterizing this era....
42 Pages (10500 words) Research Paper

Cyber-Bullying and Gender Differences

The paper "Cyber-Bullying and Gender Differences" highlights that most cases where cyberbullying prevalent is during the middle school years and it diminishes during high school.... Some researchers reported that the grades affected by cyberbullying most are grades eleven and twelve....
10 Pages (2500 words) Literature review

U.S. Security Policy and Nuclear Proliferation

security Policy and Nuclear Proliferation” explores the United States' security policy and nuclear proliferation across the globe.... security policy and nuclear proliferation and finalizes by discussing The Nuclear Age Peace Foundation.... States come together collaboratively to shun nuclear issues, with a major focus on the effects it has on national security.... security Policy has been developed and improved to increase the security level to its citizens and other people globally....
14 Pages (3500 words) Report

Security of Information in Government Organisations

The protection of information in organizations is a necessity in the modern world and calls for leaders to focus on effective information control and maintenance and therefore there is a need to integrate information security matters into the daily strategic procedures of organizations.... nformation SecurityIn view of how important information in today's organizations has become, information security has also become a major distress factor facing organization with an increasing array of threats and vicious threats in existence which has made the protection of information an intricate challenge (Bowen et al, 2007)....
15 Pages (3750 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us