Ahad, 15 Disember 2013

CHAPTER 7 : SECURITY INFORMATION SYSTEMS

CASE STUDY 7 : INFORMATION SECURITY THREATS AND POLICIES IN EUROPE   


1.What is the bonet?
Bonet is a network of autonomous malicious software agents that are under the control of a bot commander.

2.Describe some of the main points of the Digital Agenda for Europe.
The goal of  Digital Agenda for Europe to define the key role that information and communication technologies wiill play in 2020. Another goal is that broadband speed of 30Mps be available to all European citizens by 2020. In term of security, the initiative is considering the implementation of measures to protect privacy and the establishment of a well-functioning network of CERT to prevent cybercrime and respond effectively to cyber attacks.

3.Explain how a cyber attack can be carried out.
The attack was performed using a variety of technique, ranging from simple individual ping commands and massage flooding to more sophisticated distributed denial of service (DDoS) attacks. Hackers coordinated the attack by using a large number of compromised servers organized in a botnet distributed around the world. Once a computer is infected it becomes part of a network of thousands of “zombies,” machines that are commanded to carry out the attack.

4.Describe some of the weaknesses exploited by malware.
The weaknesses exploited by malware hackers had stolen codes that were then used to insert links to external servers containing malicious codes, infected computers could be under full control of the hackers and distrupt computer operation, gather sensitive information or gain access to private computer system.

Tiada ulasan:

Catat Ulasan