[ACM Press the 4th annual conference - Kennesaw, Georgia (2007.09.28-2007.09.28)] Proceedings of the 4th annual conference on Information security curriculum development - InfoSecCD '07 - Puppetnets and botnets
โ Scribed by Carrow, Erwin Louis
- Book ID
- 121220440
- Publisher
- ACM Press
- Year
- 2007
- Weight
- 351 KB
- Category
- Article
- ISBN
- 1595939091
No coin nor oath required. For personal study only.
โฆ Synopsis
The focus of this paper is to identify dominant trends of information security threats to the Internet 2001 to 2007. This paper is intended to provide an understanding of the new emphasis of attacks through use of robotic networks and how some users and organizations are already preparing a response using innovative visualization techniques in conjunction with traditional methods. The scope of research will focus on basic enterprise level services that are commonly provided by various corporations; e.g., e-mail, browser applications, wireless and mobile devices, IP telephony, and online banking. The research will first review the network infrastructure common to most corporate organizations and assume basic enterprise components and functionality in response to the current security threats. The second emphasis will consider the impact of malware robotic networks (Botnets and Puppetnets) on the corporate network infrastructure and how to address these threats with new and innovative techniques. This approach is pragmatic in application and focuses on assimilation of existing data to present a functional rationale of attacks to anticipate and prepare for this coming year.
๐ SIMILAR VOLUMES
A rootkit is a small, hard to detect computer program that stealthily invades an operating system or kernel and takes control of the computer. The rootkit can be placed on a computer by a hacker that gains unauthorized access to a computer, or by an unsuspecting authorized user that allows a virus o