1. What
is a botnet?
A bot is an autonomously operating software agent
which may be controlled by a remote operator to perform malicious tasks
typically installed onto a victim’s computer without the owner’s consent or
knowledge. Malware that exploits the vulnerabilities of the web servers,
operating systems, or applications is installed and created to take control of
the infected computers
2. Describe
some of the main points of the Digital Agenda for Europe?
Digital Agenda Europe used to define the key role that
information and communication technologies will play in 2020. It is to open the
digital market in European. Hence, broadband speeds of 30Mbps will be available
to all European citizens by 2020, and implementation of measures to protect
privacy and the establishment of a well-functioning network of CERT to prevent
cybercrime and respond effectively to cyber attacks.
3. Explain
how the cyber attack can be carried out.
There are 3 basic parts to a cyber-attack.
First of all, Access, a method to get inside or gain access to a network or system.
Secondly, Vulnerability, some part of the system that the attacker can take advantage of or
manipulate. Last but not least, Payload, the
purpose of the attack, namely, what exactly is the target and how significant
will the damage be
4 4. Describe
some of the weakness exploited by malware.
There are some weakness exploited by malware, one of
it is the security defects in software. Malware exploits defects in the sign of
the operating system, in applications or in browser pluggin such as Java and
Adobe Flash Player. Most systems contain bugs, or loopholes which may exploited
by malware.Not only that, insecure design or user error also one of the
weakness exploited by malware. Originally, PC had to be booted from floopy
disks. Until recently, it was common for a computer to boot from an external
boot device by default. This meant that computer would, by default, boot from a
floopy disk, USB flash drive, or CD and malicious boot code could be used to
install malware or boot into a modified operating system. Autorun or autoplay
features may allow code to be automatically executed from external disk drive
without permissions.Besides, over-privilleged users and over-privilleged code
cause malware allowed to modify internal structures of the system and subvert
the system.
No comments:
Post a Comment