Botnet of Things: Cybersecurity

Slides:



Advertisements
Similar presentations
MOSQUITO BREEDING ATTACK: Spread of bots using Peer To Peer INSTRUCTOR: Dr.Cliff Zou PRESENTED BY : BHARAT SOUNDARARAJAN & AMIT SHRIVATSAVA.
Advertisements

OneDrive for Business Introduction First Time Use First Time Use Access from Computer Access from Computer Access from Internet Access from Internet Access.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
FIRST COURSE Computer Concepts Internet and Microsoft Office Get to Know Your Computer.
Introduction to Computers. Objectives Overview Describe the five components of a computer Discuss the advantages and disadvantages that users experience.
SMART GRID The Next Generation Electric Grid Kunkerati Lublertlop 11/30/2011 Electrical Engineering Department Southern Taiwan University.
1.2 Security. Computer security is a branch of technology known as information security, it is applied to computers and networks. It is used to protect.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
BOTNETS Presented By : Ramesh kumar Ramesh kumar 08EBKIT049 08EBKIT049 A BIGGEST THREAT TO INERNET.
Trojan Virus By Forbes and Mark. What is a Trojan virus Trojans are malicious programs that perform actions that have not been authorised by the user.
AN_NAJAH INTERNATIONAL UNIVERSITY Electrical Engineering Department Internet & Mobile Controlling system “IMCS” Ala` Hmadneh Ansam Afaneh DR. RA`ED.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
© 2013 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. The Connected Cities Alberto.
Homework for Wed’s topic: Threats to E-Commerce 1. Review Chapter 5 in Laudon textbook 2. “Facebook's Top Cop”— Joe Sullivan and a staff of 50 people Fortune.
Ziyad Ibrahim 10DD.  What is Internet? What is Internet?  Who owns the internet? Who owns the internet?  How do you connect to the internet? How do.
Internet of Everything Prabhas Chongstitvatana Chulalongkorn University.
Types of Malware © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
Alberto Zilio, Director – Public Affairs, AT&T Europe The Connected Cities.
Internet of Things: Connected World Prabhas Chongstitvatana Chulalongkorn University Internet of Things (IoT) passcode
Technology for Aging Society Prabhas Chongstitvatana Chulalongkorn University.
Introduction to Networking. What is a Network? Discuss in groups.
Connecting A ZigBee Sensors Network To A Cellular Modem For Remote Control Presenting: Eli Zuaretz Gilad Tiomkin Advisor: Dr. Chen Avin Co Advisor: Ilan.
Internet of Things, Are You Ready?. Contents ●Introduction ●IoT Examples? ●IoT Benefits ○For Industries ○The Internet of Things In Organizations ○The.
Internet of Things – Getting Started
SCADA Supervisory Control And Data Acquisition Pantech Solutions Here is the key to learn more.
BUILDING AND IMPLEMENT A EMBEDDED WEB SERVER BASE ON TCP/IP STACK WITH A SoC PLATFORM Professor : CHI-JO WANG Name : Bui Quang Hoa (M982b211)
Introduction to Computers
EE5900 Cyber-Physical Systems
Internet of Things and Smart Cities
EE5900 Cyber-Physical Systems
Koji Nakao, Dai Arisue NICT, Japan
Objectives Overview Explain why computer literacy is vital to success in today’s world Define the term, computer, and describe the relationship between.
Combating Botnets Botnets are a complex and continuously evolving challenge to user confidence and security on the Internet. Introduction Botnets are.
Fundamental of Information Communication Technology (ICT)
Instructor Materials Chapter 7 Network Security
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF.
Researcher and Lecturer Assistant at FCI Assiut University
Prepared by: Celeste Ng Updated: May, 2017.
Internet of Things: Cybersecurity
How SCADA Systems Work?.
Smart Car through IoT 라이 아샤리 리날디
Computer Hardware-Meeting the machine
Some Common Terms The Internet is a network of computers spanning the globe. It is also called the World Wide Web. World Wide Web It is a collection of.
Jee sook, Eun May 2004 Presented in IEEE 802.1af - key management
Everything as a service
Pulse: An Adaptive Intrusion Detection System for the Internet of Things (IoT) Good morning every one , I will give you a brief overview of the work my.
IOT ppt
Objectives Overview Explain why computer literacy is vital to success in today's world Describe the five components of a computer Discuss the advantages.
Risk of the Internet At Home
Internet of Things Vulnerabilities
IoT (Internet of Things)
The Internet of Unsecure Things
IoT (Internet of Things)
AI empowering business
From Research to Product
Review of TCP/IP Internetworking
Data security in iot devices
Recent topics in Smart City
Moxa Smart Grid Technology Portfolio
Objectives Overview Explain why computer literacy is vital to success in today’s world Define the term, computer, and describe the relationship between.
WJEC GCSE Computer Science
COMPUTER NETWORKS AND THE INTERNET Chapter 6
The Internet and Electronic mail
Welcome to The World of Internet of Things
Marcial Quinones-Cardona
Substation Automation IT Needs
Done by:Thikra abdullah
An overview over Botnets
Cleaning Up the Internet of Evil Things
Presented by Shashank Shekhar Sahoo
Presentation transcript:

Botnet of Things: Cybersecurity Prabhas Chongstitvatana Faculty of Engineering Chulalongkorn University

A botnet is a collection of internet-connected devices, which may include PCs, servers, mobile devices and internet of things devices that are infected and controlled by a common type of malware. Users are often unaware of a botnet infecting their system.

Botnets can be used to perform distributed denial- of-service attack (DDoS attack), steal data, send spam, and allows the attacker to access the device and its connection. The owner can control the botnet using command and control (C&C) software. Wikipedia

What is Internet of Things Network of Physical Objects Embedded systems with electronics, software, sensors Enable objects to exchange data with manufacturer, operator, other devices through network infrastructure

Allow remote control Direct integration = computer + physical world Result: Automation in all fields

Smart Cities

Cybersecurity

Friday 21 October 2016

Mirai

 23 December 2015 Most affected were consumers of «Prykarpattyaoblenergo» (Ukrainian: Прикарпаттяобленерго; servicing Ivano-Frankivsk Oblast): 30 substations were switched off, about 230 thousands people were left without electricity for a period from 1 to 6 hours.

More Information Search “Prabhas Chongstitvatana” Get to my homepage