Thursday 5 December 2013

Information Security Threats and Policies in Europe ( Chapter 7 )

1. Botnet.


  • A botnet is a network of autonomous malicious software agents that are under the control of a bot commander.
  • The network is created by installing malware that exploits the vulnerabilities of web servers operating system, or applications to take control of the infected computer.
  • A botnet also refer to the collection of internet –connected programs in order to perform task.
  • This can be as mundane as keeping control of an internet relay chat (IRC) channel, or it could be used to send spam email or participate in distributed denial-of-service attacks.
  • The world botnet is a portmanteau of robot and network.

2. Some of the main points of the Digital Agenda for Europe.


  • Digital Agenda for Europe has recently launched by European commission.
  • The goal of this initiative is to define the key role that information and communication knowledge technologies will play in 2020.
  • The initiative calls for a single, open European digital market.
  • Another goal is that broadband speed of 80Mbps be available to all European citizen by 2020.
  • The initiative is considering the implementation of measures to protect  privacy and the establishment of a well-functioning network of CERT to prevent cybercrime and respond effectively to cyber attacks.

3. How cyber attack can be carried out.


  • The cyber attack on Estonia start in late April 2007 and lasted for almost three weeks.
  • During this period , vital parts of Estonia internet network had to be closed from access from outside the country, causing millions of dollars in economic losses/
  • At round same time, Arsys important Spanish domain registration company also targeted international hackers.
  • Arsys reported hacker had stolen codes that then use the to insert links to external server containing malicious codes in webpage of its clients.
  • French the UK and Germany were amount European countries suffered most inspection.
  • The French navy had grown all military planes when discovered its computer network was infected.
  • In UK, Worm infected computers in ministry of defence, the city of Manchester’s city council and police network.
  • Computers in network of German Army were infected too. Once, install on computer, co flicker is able to download and install other malware from control the website infected computer could be under full control of hackers.

      4. Weakness exploited by malware.


  • Malware may exploit weakness to initially infiltrate a system or to gain additional privileges on an already- compromised machine.
  •  The weaknesses may be exploit automatically by malware authors creations or manually by attempt will be generically called an attackers.
  • Weaknesses fall into 2broad categories , based on where the weaknesses lies.
  • Technical weakness involve tricking people.
  • The malware, hidden in shortcuts to executable programs (files with extension .ink) was executed  automatically when the content of an infected USB drive was displayed .
  • Employing this same technique , the worms was capable of installing other malware.
  • Data gathered later by other experts indicates that the worms was actually looking for some specific programmable Logic Controllers(PLC) devices used in a specific industrial plants. A facts that points to the possibility that malware was part of the sites infected with sabotage.
  • The significance that such a sophisticated treat represents to the industrial recourses in Europe and others parts of the world cannot be underestimated.

No comments:

Post a Comment