botnet ppt
TRANSCRIPT
-
8/12/2019 Botnet ppt
1/19
-
8/12/2019 Botnet ppt
2/19
Phishing
Criminal andfraudulent attemptsto acquire sensitiveinformation bycreating websites.
Generic greetings Poor grammar anspelling.
Emails that requurgent action.
Misleading URLs
-
8/12/2019 Botnet ppt
3/19
Cyber Stalking
Using internet or other electronicmeans to stalk or harass anindividual, a group of individuals,or an organization.
-
8/12/2019 Botnet ppt
4/19
Avoiding Cyber Stalking
Avoid sharing personal info in publicspaces. Be cautious about meeting online
acquaintances in person. Create a different email account for
registering on social networking sites.
-
8/12/2019 Botnet ppt
5/19
Identity Theft
Using someone's identity (likecredit card number or emailaccount) for any illegal purpose.
-
8/12/2019 Botnet ppt
6/19
-
8/12/2019 Botnet ppt
7/19
BlueSnarfing
Act of stealingpersonal data,specificallycalendar andcontact information,from a Bluetoothenabled device.
Keep sensitive data ofBluetooth - enabled devthe first place.
Updating your devicesregularly.
Switch off the Bluetoonot in use. Dont pair with unkno
devices.
-
8/12/2019 Botnet ppt
8/19
-
8/12/2019 Botnet ppt
9/19
How to stay protected?
Keep a clean machine. Best to have all current updates.
Protect all devices connected to theinternet.
-
8/12/2019 Botnet ppt
10/19
info
Use a strong passcode. Think before installing apps.
Disable geotagging.
-
8/12/2019 Botnet ppt
11/19
Connect with care
Beware of free Wi-Fi Protect your banking credentials Dont respond to unknown requests for
personal information.
-
8/12/2019 Botnet ppt
12/19
STOP. THINK. CONNECT.
Be a good online citizen. Practicing good online habits benefits th
global digital community.
-
8/12/2019 Botnet ppt
13/19
-
8/12/2019 Botnet ppt
14/19
What is a botnet?
Network of compromised computers beincontrolled remotely as a group.
eg. Conficker, Zeus, Waledac, Mariposa,etc.
-
8/12/2019 Botnet ppt
15/19
History of botnets
Bots originally used to automate tasks.o web crawlers used by search engines, IRC, etc
Evolved into automating malicious attacko started around 2000 with DDoS attacks againstservers.
-
8/12/2019 Botnet ppt
16/19
Some disturbing statistics
88% of all spam is sent from botnets. 50% of the Fortune 1000 organisations werecompromised by the data stealing botnet, Mariposa
-
8/12/2019 Botnet ppt
17/19
Operation of Botnets
1. Infect victim with malware usinga. Drive-by downloadsb. Email attachments & Social Engineering
2. Control the nodes through C&C server
-
8/12/2019 Botnet ppt
18/19
Uses
DDoS attacks Use of stolenresources
Rental to otherspammers
-
8/12/2019 Botnet ppt
19/19
Defences
Keep your antivirus and system softwareupto date.
Be careful while opening attachmentsand links in email and social networkingsites.