Marcial Quinones-Cardona

Slides:



Advertisements
Similar presentations
By Ashlee Parton, Kimmy McCoy, & Labdhi Shah
Advertisements

Security for Internet Every Day Use Standard Security Practices and New Threats.
BOTNETS/Cyber Criminals  How do we stop Cyber Criminals.
Threats to I.T Internet security By Cameron Mundy.
Alisha Horsfield INTERNET SAFETY. firewall Firewall- a system made to stop unauthorised access to or from a private network Firewalls also protects your.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Computer Security By Charlotte Foster 8P Computer viruses are small software programs that are designed to spread from one computer to another and to.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Safety and Security issues of using ICT Alys brooks.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Internet safety By Suman Nazir
Computer Security By Duncan Hall.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Network System Security - Task 2. Russell Johnston.
Cyber security. Malicious Code Social Engineering Detect and prevent.
Technical Implementation: Security Risks
Security Risks Todays Lesson Security Risks Security Precautions
Presented by: SBS CyberSecurity © SBS CyberSecurity, LLC
INTERNET SAFETY FOR EVERYONE
Viruses & Destructive Programs
What they are and how to protect against them
COMPUTER CRIMES Presented by THABO.
Done by… Hanoof Al-Khaldi Information Assurance
Malware and Computer Maintenance
CYBER SECURITY...
IT Security  .
Unit 4 IT Security.
Instructor Materials Chapter 7 Network Security
Backdoor Attacks.
Lesson 3 Safe Computing.
Wireless Network Security
How to build a good reputation online
Cyber Security By: Pratik Gandhi.
Answer the questions to reveal the blocks and guess the picture.
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
COMPUTER CRIME.
Lesson 2- Protecting Yourself Online
McAfee Support UK Tel McAfee Support is one of our principal technical assistance facilities to the users of McAfee—a part of the gargantuan.
Risk of the Internet At Home
– Communication Technology in a Changing World
Internet Safety for Everyone
Chap 10 Malicious Software.
ISNE101 Dr. Ken Cosh Week 13.
The Internet of Unsecure Things
HOW DO I KEEP MY COMPUTER SAFE?
Internet Safety for Everyone
Computer Security.
Faculty of Science IT Department By Raz Dara MA.
Bethesda Cybersecurity Club
Unit 4 IT Security Kerris Davies.
Chap 10 Malicious Software.
Internet Safety for Everyone
Computer Security By: Muhammed Anwar.
Securing your system, protecting your digital data and devices.
WJEC GCSE Computer Science
Lesson 2- Protecting Yourself Online
Test 3 review FTP & Cybersecurity
Internet Safety for Everyone
Internet Safety for Everyone
What devices use the internet?
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
Wireless Spoofing Attacks on Mobile Devices
Botnets and Remote Administration Tools
G061 - Network Security.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
An overview over Botnets
Types of Cybercrime Cyber crime is any kind of unlawful behaviour that involves the use of computers, either as a tool for committing a crime (such as.
Presentation transcript:

Marcial Quinones-Cardona Botnets Individual Project By Marcial Quinones-Cardona Mercy College Dr. John Yoon

What is a Botnet? A collection of hacked computers whose purpose is to perform criminal attacks. A hacker will send a virus to a user hoping that they will download the program. Upon opening the file, the virus will then install itself and the user will join the botnet. A botnet owner can perform acts such as stealing data from one’s computer, DDoS (Distributed Denial of Service) attacks, and keylogging, and email spam.

How Botnets are Spread: More in Depth Look Botnets can be spread throughout any type of media or messaging service. Emails are a very common place that a virus can be sent. Users can spoof their address which means they can send you an email from a service they aren’t really using. Ex: You can spoof an address to say support@apple.com and have your Apple account stolen through phishing. The same method for phishing can be used for virus spreading.

How Easy it is to Obtain a Botnet? Gaining a botnet is fairly easy. Services such as, “Botnet-as-a-Service” or BaaS have been created so that you can easily buy someone’s botnet. What this means is that you can pay as little as $5 to a hacker and they will allow you to use their botnet service. This botnet service can allow you to send multiple viruses to infected victims, DDoS websites, and the other malicious things mentioned in the previous slide. Additionally, one can even go through the effort of hacking a fridge or security camera to use in a botnet.

Why It’s Important to Stop Botnets Botnets are one of the most malicious viruses one can have on their computer. They are easily undetectable, especially when the victim is unaware that their computer might be compromised. Companies can lose out on millions of dollars every second their website services are down! These botnets can be used to attack government websites or hack government property.

Problems With Malware Detection No set method on detecting them. Antivirus and firewalls are helpful, but for only so long; What is meant by that is technology is advancing which means that malware is too. Your simple firewall and antivirus can only detect so much. Internet of Things (IoT) devices are common in most households. These can cause an issue by being hacked and used in botnet software as well. There is essentially no AV (anti virus) for these devices, essentially making malware detection a problem. No organization has been created specifically to stop cyber crimes.

How We Can Potentially Fix the Problem Honeypots: A honeypot is essentially a trap that is used to either allow an attack to go through on a false server/system or to prevent it from happening in general. Preventing the attack from even happening can be a huge life saver. Help emulate the attack so we can understand how it happened and prevent it in the future.

How We Can Potentially Fix the Problem Contd. [1] Filter Module: Set up a filter that whitelists and blacklists incoming connections. Get a general idea of who is a real person accessing a website or a bot. Monitor their activity and see what they are browsing and doing on said website.

How We Can Potentially Fix the Problem Contd. [2] Track the Source: By looking through the source code or potentially learning more about where it originated, we can track down who may have started the botnet. Developers have been caught before selling their products to the wrong people. (Law Enforcement) There is no specific team for cyber crime, but the FBI and other branches of the law work effortlessly to find these criminals. Locking them away can help prevent them from creating these sources.

Conclusion Stopping botnets is going to be a very hard thing. Research is going to be needed to understand the mindset of those who are creating these tools and then potentially allowing us to come up with ways to stop them from spreading. Tools should be created to detect any suspicious software that was installed on the computer. Additionally, applications can be made to not only monitor programs that have been installed the past few days, but also see what they are doing in the background.