Compu Talk Vol
Total Page:16
File Type:pdf, Size:1020Kb
Sri Sathya Sai College for Women, Bhopal 2017 A newsletter from the Dept. of Computer Sci. & Appl. Compu Talk Vol. III Cyber Security job oppurtunities Botnet Department of Computer Computer Network Science and Application Firewall Departmental News Now Trending: including smartphones, televisions and tiny devices and integration of these as part of the Job Opportunities under the Cyber Internet of Things. Boom in cyber threats has Security Umbrella been an integral part of boom in information technology . Cyber security also known in simpler terms as computer security or IT security involves the Typical cyber security job titles and protection of computer systems from theft, descriptions may include the following: damage or destruction of 1. Security Analyst their hardware, software, data and information, as well from disruption, misuse or A Security Analyst analyzes and assesses misdirection of the services provided through vulnerabilities in the infrastructure which them to cause damage to the fellow humans or includes software, hardware and the society. associated networks. He/she performs The role of cyber security involves investigation using available tools, suggests controlling or limiting physical access to the counter-measures to remedy the detected hardware, as well as protecting them against any vulnerabilities, and recommends solutions harm or attack that may come via network and best practices. He/she analyzes and access intrusion, data insertion and code assesses the damage done to the injection and remote control. IT security is data/infrastructure as a result of security susceptible to being tricked into deviating from incidents, examines available recovery tools secure procedures through various methods. and processes, and recommends solutions. This may occur either due to malpractices by He/she performs tests for compliance with operators, which may be either intentional or security policies and procedures. His/her role accidental or in connivance. may also include providing assistance in the creation, implementation, or management of security solutions. 2. Security Engineer A Security Engineer performs security monitoring, security and data/logs analysis and forensic analysis in order to detect security incidents, and mounts the incident response. He/she investigates and utilizes new technologies and processes to enhance security capabilities and implement improvements. He/she may also review code or perform other security The field of cyber security is growing into an engineering methodologies. Security utmost important aspect of the world as a whole engineering is a specialized field of due to the increasing reliance on computer engineering that focuses on the security systems, the Internet, wireless networks such as aspects in the design of systems that need to Bluetooth and Wi-Fi, boom in the development be able to deal robustly with possible and use of "smart" devices, sources of disruption, ranging from natural disasters to malicious acts. It is similar to Broad titles that encompass any one or all of other systems engineering activities in that the other roles or titles are tasked with its primary motivation is to support the protecting computers, networks, software, delivery of engineering solutions that satisfy data or information systems against viruses, pre-defined functional and user worms, spyware, malware, intrusion requirements, but with the added dimension detection, unauthorized access, denial-of- of preventing misuse and malicious service attacks, and an ever increasing list of behavior. These constraints and restrictions attacks by hackers acting as individuals or as are often asserted as a security policy. part of organized crime or foreign governments. 3. Security Architect Student programs are being made available throughout the country on various A Security Architect designs a security platforms for individuals interested in system or major components of a security beginning a career in cyber security as system, and may head a security design team specialization after graduation. Meanwhile, a involved in building a new security system. flexible and effective option for information security professionals of all experience 4. Security Administrator levels is to keep studying through online courses, trainings and webcasts related to A Security Administrator installs and cyber security methodologies. manages organization-wide security systems. Abhilasha Kumar:[email protected] He/she may also take on some of the tasks of a security analyst in smaller organizations. Botnets: 5. Chief Information Security Officer The Dangerous Side Effects Of The Internet (CISO) Of Things A Chief Information Security Officer is a The Internet of Things (IoT) is the name given high-level management position responsible to describe the relatively new technology that for the entire information security connects everyday objects and devices to the division/staff. This may include hands-on web to provide additional data or functionality. technical work as regards the security of But in the race to create that next ―it‖ product that no one can live without (smart fry pans information is concerned. anyone?), manufacturers and users are creating 6. Chief Security Officer (CSO) dangerous side effects known as botnets. A Chief Security Officer is again a high- The term botnet simply means a group of level management position responsible for internet-connected devices controlled by a the entire security division/staff. This is central system. But the term is most often used comparably a newer position now deemed in conjunction with a particular type of malicious hacking, especially Distributed Denial essential as security risks are growing by the of Service Attacks (DDoS attacks). In this case, day. a hacker uses a large botnet group of internet- 7. Security connected devices to flood a website or network consultant/Specialist/Intelligence resource with fake requests so that legitimate users cannot access it.By using a botnet with hundreds or even thousands of devices, all with 3 their own unique IP addresses, the hacker makes vulnerabilities that have not been patched, in it almost impossible to stop the attack or hopes of infecting as many devices as possible. distinguish legitimate users from fake ones. Botnet malware may also scan for ineffective or The market has been flooded with inexpensive outdated security products, such as firewalls devices — webcams, baby monitors, or antivirus software. thermostats, and yes, even yoga mats and fry pans — that connect to the Internet, each of Notable Botnet attacks which has its own IP address. But these devices have little or no built-in security, and even when Zeus they do, users often neglect to even take the basic step of setting a password for them. That The Zeus malware, first detected in 2007, is one makes them easy targets for hackers wanting to of the best-known and widely used malware create and use a botnet. types in the history of information security. How botnets work Srizbi The term botnet is derived from the The Srizbi botnet, which was first discovered in words robotand network. A bot in this case is a 2007, was, for a time, the largest botnet in the device infected by malware, which then world. Srizbi, also known as the Ron Paul spam becomes part of a network, or net, of infected botnet, was responsible for a massive amount of devices controlled by a single attacker or attack email spam -- as much as 60 billion messages a group.The botnet malware typically looks for day, accounting for roughly half of all email vulnerable devices across the internet, rather spam on the internet at the time. In 2007, the than targeting specific individuals, companies or Srizbi botnet was used to send out political spam industries. emails promoting then-U.S. Presidential The objective for creating a botnet is to infect as candidate Ron Paul. many connected devices as possible, and to use Gameover Zeus the computing power and resources of those devices for automated tasks that generally Approximately a year after the original Zeus remain hidden to the users of the devices. On its botnet was disrupted, a new version of the Zeus own, that fraction of bandwidth taken from an malware emerged, known as Gameover Zeus. individual device won't offer much to the Instead of relying on a traditional, centralized C cybercriminals running the ad fraud campaign. & amp; C operation to control bots, Gameover However, a botnet that combines millions of Zeus used a peer-to- peer network approach, devices will be able to generate a massive which initially made the botnet harder for law amount of fake traffic for ad fraud, while also enforcement and security vendors to pinpoint avoiding detection by the individuals using the and disrupt. devices. Methbot Botnet architecture An extensive cybercrime operation and ad fraud Botnet infections are usually spread through botnet known as Methbot was revealed in 2016 malware, such as a Trojan horse. Botnet by cyber security services company White Ops. malware is typically designed to automatically According to security researchers, Methbot was scan systems and devices for common generating between $3 million and $5 million in 4 fraudulent ad revenue daily last year by 6. Ensure that your system is patched with the producing fraudulent clicks for online ads, as most current Microsoft Windows Update. well as fake views of video advertisements. 7. Set your computer’s security settings to Mirai update automatically, to ensure you always have the most current system patches. Several powerful, record-setting distributed denial-of- service (DDoS) attacks were observed (Source:https: in late 2016, and they later traced to a new brand of malware known as Mirai. Mirai malware is //en.wikipedia.org/wiki/BotnetComputer designed to scan the internet for insecure Babita Sakalle:[email protected] connected devices.Once it identifies an insecure device, the malware tries to log in with a series Computer Network of common default passwords used by manufacturers. If those passwords don't A network is defined as a group of two or more computer systems linked together.