The wide availability of botnet building malware for sale on the Dark Web makes

The wide availability of botnet building malware for

This preview shows page 5 - 8 out of 9 pages.

The wide availability of botnet-building malware for sale on the Dark Web makes botnets an appealing tool for cybercriminal attackers. While botnets continue to evolve in its resiliency as one report from the IBM Managed Security Services Threat Research group (McMillen, 2016), new technology like Internet of Things (IoT) comprising of everyday devices like closed- circuit television (CCTV) cameras, refrigerators, televisions and industrial devices that manages flow, monitor events and emergency trigger valves presents new opportunities for botnets. Botnets offer cybercriminals many uses and take advantage of computing resources that do not belong to them, makes it a high impact and yet low-cost tool in the cybercriminals’ toolkit. Botnet Countermeasures Literature reviews show there are countermeasures for combating botnets and they fall primarily into these five categories (Emmanuel Ogu, Olusegun Ojesanmi, Oludele Awodele, and Shade Kuyoro, 2019):
Image of page 5
GLOBAL CYBERSECURITY ENVIRONMENT REPORT 6 1. Prevention. Strengthening the entry and exit points to the network to decrease the chance of allowing malicious network traffic and data from entering. 2. Detection. The ability to identify a botnet within the network. Analysis of data packets, traffic within the network proactively to identify bonnets. 3. Offensive. Launching a counter-attack against the botnet entity with the objective of taking it down. 4. Reconnaissance. Passively monitor a known botnet detected in the network to gather as much information as possible relating to the botnet’s operations, strength, size, architecture, obfuscation techniques and capabilities. 5. Mitigation. Controlling and limiting the extent of damage in the network. Taking down compromised systems, closing unused ports on hosts are some examples. Global cybersecurity policy controls enable the allocation of resources to focus on some countermeasures described above. A global task force will have the ability to perform reconnaissance on known and upcoming botnets to gather intelligence. With this information, member countries and entities can enhance their networks to prevent these malicious data from entering. On the other hand, the same information can be used to detect dormant botnets already existing within the network and take mitigating efforts to eradicate them. Finally, the global task force, with the relevant botnet information, can perform offensive attacks with cooperation from member entities to take down the botnets.
Image of page 6
GLOBAL CYBERSECURITY ENVIRONMENT REPORT 7 Conclusion Through the discussion from this paper, it is recognized that challenges exist to mitigate cybersecurity risks from a global country level perspective.
Image of page 7
Image of page 8

You've reached the end of your free preview.

Want to read all 9 pages?

  • Spring '18
  • Federal Bureau of Investigation, Denial-of-service attack, E-mail spam, Computer crime

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern

Stuck? We have tutors online 24/7 who can help you get unstuck.
A+ icon
Ask Expert Tutors You can ask You can ask You can ask (will expire )
Answers in as fast as 15 minutes
A+ icon
Ask Expert Tutors