Tuesday, January 21, 2020

Word of the Day: botnet

 
Word of the Day WhatIs.com
Daily updates on the latest technology terms | January 21, 2019
botnet

A botnet is a network of infected smart computing devices controlled by a common type of malware. The term botnet is derived from the words robot and network. A robot, in this context, is a malicious program that operates as an agent for a human attacker.


In the traditional client-server approach to building a botnet, an attacker would set up a command and control (C&C) server and use the server to find new clients and issue instructions to infected clients. Law enforcement efforts to shut down this type of botnet architecture would focus on locating the C&C source and disabling it.


In response, attackers turned to decentralized architectures that do not have a single point of failure. Today, botnet take-down efforts typically focus on reverse engineering peer-to-peer (P2P) communication between infected clients and disrupting the attacker's monetization scheme, rather than the bot's technical infrastructure.


In recent years, the Internet of Things (IoT) has become a useful gateway for distributing malware and building botnets. Continue reading...

Talking About Botnets

 

"Botnets continue to be one of the most prevalent and dangerous forms of malware organizations contend with. That's in part because botnets tend to target devices that can't be patched or updated and yet fill a critical function inside an organization." - Anthony Giandomenico

Botnets in the News

 

CyCognito turning tables by using botnets for good
In this Q&A, CyCognito CEO Rob Gurzeev discusses how attack simulations work and how he plans to spend the company's recent round of funding.

FBI: How we stopped the Mirai botnet attacks
FBI Special Agent Elliott Peterson gave RSA attendees a behind-the-scenes look at the investigation into the Mirai botnet.

Understanding the new breed of command-and-control servers
Command-and-control servers are now using public cloud services, social media and other resources to evade detection. Learn how to combat this type of threat.

5 steps to kick-start your cloud incident response strategy
Learn why a cloud incident management strategy should not be optional for enterprises working in the cloud.

The top network security trends, threats and strategies in 2020
Ransomware and attacks against cloud providers reflect key network security trends in 2020.

Acronym Challenge

 

RPA software is trained to mimic routine, labor-intensive tasks performed by humans. What does RPA stand for?

a. robotic process automation

b. robot program algorithm

Click on this link to see the answer!


Stay in Touch

 

Thank you for reading! For feedback about any of our definitions or to suggest a new definition (or learning resource) please contact us at: editor@whatIs.com

FOLLOW US

TwitterRSS
About This E-Newsletter
The Word of the Day is published by TechTarget, Inc., 275 Grove Street, Newton, Massachusetts, 02466 US.

Click to: Unsubscribe.

You are receiving this email because you are a member of TechTarget. When you access content from this email, your information may be shared with the sponsors or future sponsors of that content and with our Partners, see up-to-date Partners List, as described in our Privacy Policy. For additional information, please contact: webmaster@techtarget.com.

© 2019 TechTarget, Inc. all rights reserved. Designated trademarks, brands, logos, and service marks are the property of their respective owners.

Privacy Policy | Partners List
TechTarget

No comments: