Mis Case Study Botnet

4
Qno1. Ans: Botnets are the launch pad for much of today's criminal activity on the Internet. In many ways, they are the perfect base of operations for computer criminals. Businesses are threatened by botnets first because business networks are often used as platforms for botnet attacks. Botnets have been discovered that include as many as twelve million computers. After a botnet is established by hackers, it can be rented out to other nefarious individuals and used to distribute spam messages, create cyber attacks, or steal financial data, passwords, and other information. A company whose operations are fully based and executed on their website can face major problems their sales can go down even stop Due to DoS (denial of service), like Jersey- joe. Their customers were trying to access the website to place orders but they coudnt access it because Hackers have send many request’s at one time, thus server went off. Stealing data again is a bad impact on a buiness because in this competitive era every firm is trying to find out secrets of their competitive rivals in order to slow them down or to kick out them out of the market so again bot armies are destroying a firms major operations. With the advent of wireless networking, the hacking threats businesses face have multiplied. In many scenarios, hackers no longer have to work their way inside a company's network either physically or through the Internet: all they have to do is park their car outside. Wireless network security is often inadequately implemented (if implemented at all) by businesses, paving the way for hackers to join their network. Once they are connected to the wireless network, hackers can access company data just as if

description

It is a case analysis

Transcript of Mis Case Study Botnet

Qno1.

Ans: Botnets are the launch pad for much of today's criminal activity on the Internet. In many ways, they are the perfect base of operations for computer criminals. Businesses are threatened by botnets first because business networks are often used as platforms for botnet attacks. Botnets have been discovered that include as many as twelve million computers. After a botnet is established by hackers, it can be rented out to other nefarious individuals and used to distribute spam messages, create cyber attacks, or steal financial data, passwords, and other information. A company whose operations are fully based and executed on their website can face major problems their sales can go down even stop Due to DoS (denial of service), like Jersey-joe. Their customers were trying to access the website to place orders but they coudnt access it because Hackers have send many requests at one time, thus server went off. Stealing data again is a bad impact on a buiness because in this competitive era every firm is trying to find out secrets of their competitive rivals in order to slow them down or to kick out them out of the market so again bot armies are destroying a firms major operations. With the advent of wireless networking, thehackingthreats businesses face have multiplied. In many scenarios, hackers no longer have to work their way inside a company's network either physically or through the Internet: all they have to do is park their car outside. Wireless network security is often inadequately implemented (if implemented at all) by businesses, paving the way for hackers to join their network. Once they are connected to the wireless network, hackers can access company data just as if they were an employee. Overall Botnets have a negative effect on a buinessQno2.

Ans:Businesses should evaluate the risks, their networks face and then develop plans to manage those risks and secure their resources from threats of hacking. Following are some measures that an organization can take :-

Technology Factor,This is the most important factor that can prevent Botnets attack to an organization. Many of the big buisness firms carry their major buiness processes through Personal Computers by using Internet but the one who use them wisely can survive botnets attack. They should :- Install the necessary firewalls:this will block most known malicious attacks from infecting your computer.

Use a pass word that has at least 6 characters:do not use the same password for different programmes.

Install Software Patches:this covers up wholes in software programs.

Install Anti-virus Programs:this stops viruses before they reach your hard drive & safeguard your PC.

Keep all software up to date:as viruses & malicious attacks modernize so should your softwareManagement should be trained in identifying such attacks or hackers. If a suspecious computer is trying to get in the organizations network or unwanted files are being sent to the clients(Users), (can be identified by Installing Antiviruses or windows defender or even Genuine software Identifier) they should immediately reported to the organizations IT Engineer and from his office all the system should be temporary shutdown or other measures should be taken to stop it. Security Policy, is also an important measure that a firm should take. For security purpose a separate budjet should be announced. Follwong are some policies :-

Password of the Users should be changed frequently after some time. Users should be given some password length

They should not be allwed to discuss their passwords and user ID with each other.Qno3.

Ans: It wouldnt be easy for a small buisness firm to combat botnet attacks but its not impossiable too. Small buisnessess can combat botnet attacks if they install proper antivirus or anti spywares from a well known and registered companys like Norton, Mcafee, NODS32 etc. Small companys can also have sentry computers which acts as a filter agent between the internal network of the company and external public network. Sniffer software can also be used to identify any threats. VPN(Virtual private network) can also be created to provide remote offices or individual users with secure access to their organization's network. A strong fire wall can also be established.