Thursday 5 December 2013

Chapter 7: Information security threats and policies in Europe


     
     
           1. What is a botnet?

A bot is an autonomously operating software agent which may be controlled by a remote operator to perform malicious tasks typically installed onto a victim’s computer without the owner’s consent or knowledge. Malware that exploits the vulnerabilities of the web servers, operating systems, or applications is installed and created to take control of the infected computers           


      2.   Describe some of the main points of the Digital Agenda for Europe?

Digital Agenda Europe used to define the key role that information and communication technologies will play in 2020. It is to open the digital market in European. Hence, broadband speeds of 30Mbps will be available to all European citizens by 2020, and implementation of measures to protect privacy and the establishment of a well-functioning network of CERT to prevent cybercrime and respond effectively to cyber attacks.

                         3.   Explain how the cyber attack can be carried out.
 There are 3 basic parts to a cyber-attack. First of all, Access, a method to get inside or gain access to a network or system. Secondly, Vulnerability, some part of the system that the attacker can take advantage of or manipulate. Last but not least, Payload, the purpose of the attack, namely, what exactly is the target and how significant will the damage be

4           4.    Describe some of the weakness exploited by malware.

There are some weakness exploited by malware, one of it is the security defects in software. Malware exploits defects in the sign of the operating system, in applications or in browser pluggin such as Java and Adobe Flash Player. Most systems contain bugs, or loopholes which may exploited by malware.Not only that, insecure design or user error also one of the weakness exploited by malware. Originally, PC had to be booted from floopy disks. Until recently, it was common for a computer to boot from an external boot device by default. This meant that computer would, by default, boot from a floopy disk, USB flash drive, or CD and malicious boot code could be used to install malware or boot into a modified operating system. Autorun or autoplay features may allow code to be automatically executed from external disk drive without permissions.Besides, over-privilleged users and over-privilleged code cause malware allowed to modify internal structures of the system and subvert the system.

No comments:

Post a Comment