CASE
STUDY 7 : INFORMATION SECURITY THREATS AND POLICIES IN EUROPE
1.What is the bonet?
Bonet
is a network of autonomous malicious software agents that are under the control
of a bot commander.
2.Describe some of the main points
of the Digital Agenda for Europe.
The
goal of Digital Agenda for Europe to define the key role that information
and communication technologies wiill play in 2020. Another goal is that broadband
speed of 30Mps be available to all European citizens by 2020. In term of
security, the initiative is considering the implementation of measures to
protect privacy and the establishment of a well-functioning network of CERT to
prevent cybercrime and respond effectively to cyber attacks.
3.Explain how a cyber attack can be
carried out.
The
attack was performed using a variety of technique, ranging from simple
individual ping commands and massage flooding to more sophisticated distributed
denial of service (DDoS) attacks. Hackers coordinated the attack by using a
large number of compromised servers organized in a botnet distributed around
the world. Once a computer is infected it becomes part of a network of
thousands of “zombies,” machines that are commanded to carry out the attack.
4.Describe some of the weaknesses
exploited by malware.
The
weaknesses exploited by malware hackers
had stolen codes that were then used to insert links to external servers
containing malicious codes, infected computers could be under full control of
the hackers and distrupt computer operation, gather sensitive information or
gain access to private computer system.
Tiada ulasan:
Catat Ulasan