๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

[ACM Press the 4th annual conference - Kennesaw, Georgia (2007.09.28-2007.09.28)] Proceedings of the 4th annual conference on Information security curriculum development - InfoSecCD '07 - Puppetnets and botnets

โœ Scribed by Carrow, Erwin Louis


Book ID
121220440
Publisher
ACM Press
Year
2007
Weight
351 KB
Category
Article
ISBN
1595939091

No coin nor oath required. For personal study only.

โœฆ Synopsis


The focus of this paper is to identify dominant trends of information security threats to the Internet 2001 to 2007. This paper is intended to provide an understanding of the new emphasis of attacks through use of robotic networks and how some users and organizations are already preparing a response using innovative visualization techniques in conjunction with traditional methods. The scope of research will focus on basic enterprise level services that are commonly provided by various corporations; e.g., e-mail, browser applications, wireless and mobile devices, IP telephony, and online banking. The research will first review the network infrastructure common to most corporate organizations and assume basic enterprise components and functionality in response to the current security threats. The second emphasis will consider the impact of malware robotic networks (Botnets and Puppetnets) on the corporate network infrastructure and how to address these threats with new and innovative techniques. This approach is pragmatic in application and focuses on assimilation of existing data to present a functional rationale of attacks to anticipate and prepare for this coming year.


๐Ÿ“œ SIMILAR VOLUMES


[ACM Press the 4th annual conference - K
โœ Bowman, Michael; Brown, Heath D.; Pitt, Paul ๐Ÿ“‚ Article ๐Ÿ“… 2007 ๐Ÿ› ACM Press โš– 89 KB

A rootkit is a small, hard to detect computer program that stealthily invades an operating system or kernel and takes control of the computer. The rootkit can be placed on a computer by a hacker that gains unauthorized access to a computer, or by an unsuspecting authorized user that allows a virus o