Botnet (2019-CH-424)
Botnet (2019-CH-424)
Botnet (2019-CH-424)
SUBMITTED TO:
MUHAMMAD YASIR
LECTURER OF COMPUTING FUNDAMENTALS
SUBMITTED BY:
ASMA MARYAM
CHEMICAL ENGINEERING
REG.NO:424
SESSION 2019-23
Page 1 of 5
BOTNET:
The Internet is replete with threats to online security. Many of these
threats are just beneficial, positive technologies turned to evil use. The
botnets is an example of using good technologies for malevolence. A
botnet is nothing more than a string of connected computers coordinated
together to perform a task. That can be maintaining a chat room, or it
can be taking control of your computer. Botnets are just one of the many
perils out there on the Internet.
BOTNET ACCESS THE COMPUTER:
In some cases, your machine is directly hacked, while other times what
is known as a “spider” (a program that crawl the Internet looking for
holes in security to exploit) does the hacking automatically.
More often than not, what botnets are looking to do is to add your
computer to their web. That usually happens through a driven-by
download or jesting you to install torjan horse on your computer.
What happens if botnets get access to your machine?
Once the software is downloaded, the botnet will now contact its
master computer and let it know that everything is ready to go. Now
your computer, phone or tablet is entirely under the control of the person
who created the botnet.
BOTNET’S OWNER CONTROLS YOUR PC:
They usually use your machine to carry out other nefarious tasks,
common tasks executed by botnets include:
Page 2 of 5
Replacing banner ads in your web browser specifically targeted at
you.
Pop-ups ads designed to get you to pay for the removal of the botnet
through a phony anti-spyware package
The short answer is that a botnet is hijacking your computer to do what
botnets do, carry out mundane tasks, faster and better.
PROTECT THE COMPUTER FROM BOTNET:
Most people who are infected with botnets aren’t even aware that their
computer’s security has become compromised. However, taking simple,
common-sense precautions when using the Internet can not only remove
botnets that have been installed, it can also prevent them from being
installed on your computer, tablet and phone in the first place.
Page 3 of 5
If you’re using a Windows-based machine, you might need to
install third-party software.
Don’t visit websites that are known distributors of malware. One
HONEYPOT:
“A honey pot is a network-attached system set up as a decoy to lure
cyber attackers and to detect, deflect or study hacking trails in order to
obtain unauthorized access to information systems.”
OBJECTIVES OF HONEYPOT:
The function of a honey pot is to represent itself on the internet as a
potential target for attackers, usually a server or other high-value target
to gather information and notify defenders of any attempts to access the
honey pot by unauthorized users.
USEAGE OF HONEYPOT:
Honey pots are most often used by large enterprises and by companies
involved in cyber security research, to identify and defend attacks from
advanced persistent threat actors. Honey pots can be an important tool
for large organizations to take an active defense stance against attackers,
or for cyber security researchers who want to learn more about the tools
and techniques that attackers use.
HONEYPOT ACTIONS:
Generally, a honey pot operation consists of a computer, applications
and data that simulate the behavior of a real system and appears as part
of a network; however, the honey pot is actually isolated and closely
Page 4 of 5
monitored. Because there is no reason for legitimate users to access a
honey pot, any attempts to communicate with a honey pot should be
considered hostile.
ADVANTAGES AND DISADVANTAGES:
Advantages Disadvantages
Starting point is good Detect the attacks that are known
Analyzing and logging is quite simple Limited logging abilities are available.
Easy to install, deploy and maintain. Only detect by a skilled attacker
Encryption experienced hackers can often
differentiate by using system
fingerprinting techniques
Page 5 of 5