StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Build Your Own Botnet - Essay Example

Cite this document
Summary
In the paper “Build Your Own Botnet” the author explains how to build a botnet. First, it is necessary to shelter the Botnet server, then develop a Linux host running Ubuntu 10.10 server edition and deploy a LAMP environment. Then it is necessary to connect the host to a dedicated ADSL link…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.3% of users find it useful
Build Your Own Botnet
Read Text Preview

Extract of sample "Build Your Own Botnet"

These attacks interrupt a message between two segments of a system by inserting themselves as malicious actors who then impersonates both parties to gain access to information that the two parties are exchanging (Strebe 25). Prevention from MITM attacks includes using PKI or Public Key Infrastructure, reinforced mutual authentication like secret keys, second channel authentication, and reinforced encryption.4. Browser SecurityInvolves ensuring that one’s computer is protected against possibly lethal materials or suspicious software obtained online.

Browser security is obtained through simple security tips like deletion of spam, use of passwords, using a firewall, and only opening email attachments deemed safe. 5. DLP or data loss preventionDLP is a crucial way of protecting susceptible information or data via messaging, endpoints, and web gateways. Effective implementation of DLP involves proactive identification, tracking, and securing sensitive organizational data from all vulnerable points within the organization with little or no effect on employees’ routine and output. 6. SnortI would apply snort in my organization but only on the condition that the primary organizational antivirus as a threat or untrusted programs does not perceive it (Strebe 136).

The advantage is that all employees will have their computers protected from intrusion on a real-time basis. Additionally, the administrator can use the traffic analysis and packet logs to trace any intrusion issues on each user’s computer.7. SYN flood attack and preventionSYN flood presents attacks that deny services by dominating immense server resources of a host thereby preventing the system from being responsive to genuine interchange. Prevention techniques include firewalls and proxies, filtering, SYN cache and cookies, and elevated backlog amongst others.8. WiMax and LTEWiMax or Wireless Interoperability for Microwave Access is a convention for communication using set wireless networks with data transfer of up to 49 Mb/s.

In data terminals and mobile phones, Long Term Evolution or LTE convention defines high-speed communication of data. 9. Secure infrastructure using access controlSAC guarantees that only authorized users get into the system and motivates the authorized users to remain security conscious through regular password changing. This way, unauthorized users do not gain access to the system. 10. Pros and cons of biometric analysisPrimary merit is that individual information is distinct and regardless of time, the biometric information is still reliable for access control, non-repudiation and data integrity, privacy, and authentication.

The cons include unreliability with changes in humans over time like illnesses changing people’s eyes, voice, or fingers. Since it involves huge personal information, it is intrusive.11. Advantages of hashing passwordsThe technique of using a value that is distinct to a specific website and combining it into a master password and passing the combination through a hash function. The resulting random string then becomes the website’s password. Such passwords are never compromised even when the server is compromised.12. Digital certificatesAdd-ons in electronic mail used to enhance security by confirming the identity of the sender and allow the recipient to encode a reply.13. Hot siteA location outside organization premises where a firm’s operations can proceed during adversity and permit regular business activities14.

Risk mitigation strategyNetwork risk is reduced using a single-vendor incorporated system while IT risk involves using virtualization (Strebe 254).

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Build Your Own Botnet Essay Example | Topics and Well Written Essays - 500 words, n.d.)
Build Your Own Botnet Essay Example | Topics and Well Written Essays - 500 words. https://studentshare.org/information-technology/1654553-ect
(Build Your Own Botnet Essay Example | Topics and Well Written Essays - 500 Words)
Build Your Own Botnet Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1654553-ect.
“Build Your Own Botnet Essay Example | Topics and Well Written Essays - 500 Words”. https://studentshare.org/information-technology/1654553-ect.
  • Cited: 0 times

CHECK THESE SAMPLES OF Build Your Own Botnet

How to Develop a Brand When Utilising Lifestyle Marketing

DPP BY YOU your SCHOOL INFO HERE DATE HERE DPP Personal reflection As a future marketing manager, there are many implications associated with achieving the Master's Degree.... The Master's curriculum is more advanced than undergraduate, exploring sophisticated concepts related to marketing....
6 Pages (1500 words) Assignment

Populated Borough Barnet

Barnet is the second largest populated borough in London and is a mixture of many ethnic groups.... As a result of their diversity, the residents of this borough believe that their case is strengthened and it has increased the want for more people to come live in the area.... hellip; Housing has become an issue that needs to be addressed immediately....
15 Pages (3750 words) Essay

Analysis of Biography of a Runaway Slave by M. Barnet

These memories were important because it enabled Montejo to remember a life outside of Cuba – a time when his people have not exploited laborers, but are rather, workers for their own sugar plantations.... The author describes memories of Esteban Montejo in the “First Memories” subsection and tells why these memories were so important to him, aspects of life in the barracoons and identifies the Montejo's need to seek freedom and methods used for survival while he was in the woods… In the first subsection entitled First Memories, describes his memories as a child, of being in Africa and the things his people enjoyed....
4 Pages (1000 words) Assignment

Your Development as an Educator

Conversely, when students perform well, it is for their own benefit and that of the nursing practice.... Firstly, your development as an educator Teaching nursing requires one to have several strategies that would enable them carry outtheir duties effectively.... For example, the principle of producing qualified and competent nurses would always be there, and this is what helps me build up my teaching strategies....
2 Pages (500 words) Essay

The Women in Pride and Prejudice

Darcy} looked for a moment at Elizabeth, till catching her eye, he withdrew his own and coldly said, She is tolerable; but not handsome enough to tempt me; and I am in no humour at present to give consequence to young ladies who are slighted by… The snobbishness of Mr.... ....
7 Pages (1750 words) Essay

Recognizing the Signs of Alzheimer's Disease in its Prevention

With natural memory loss the "thing" that you may have forgotten -- whether it is where you put your keys, your shoes or the remembering of someone's birthday -- will come back later; with Alzheimer's, it may not come back.... The writer of this research will describe the definition of Alzheimer's disease in contrast with normal aging....
11 Pages (2750 words) Research Paper

WiMax for Amford

This assignment "WiMax for Amford" discusses Amford that has a need for improved communications.... A wide area network (WAN) or metropolitan area network (MAN) technology, is being used for difficult communication in rural areas but is it any good for curing the ills of Amford.... hellip; The Home Page will simply show the title and links to the other pages, see Figure 1, it has to be clear of everything other than a few adverts for things like anti-virus programs....
12 Pages (3000 words) Assignment

Utah Performing Arts - Place and Methods

Some of them support the program while at the same moment others do oppose the proposal to build such a centre in the heart of a busy city.... Some of them support the program while at the same moment others do oppose the proposal to build such a centre in the heart of a busy city.... This paper intends to look at the controversy that may provide a solid foundation on whether to proceed with the program to build the centre for performing or take another option....
12 Pages (3000 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us