427 Botnet fm qxd



Download 6,98 Mb.
Pdf ko'rish
bet338/387
Sana03.12.2022
Hajmi6,98 Mb.
#878307
1   ...   334   335   336   337   338   339   340   341   ...   387
Bog'liq
Botnets - The killer web applications

www.syngress.com
410
Chapter 11 • Intelligence Resources
427_Botnet_11.qxd 1/9/07 9:56 AM Page 410


Summary
The intelligence you gather about a threat like botnets is vital to your ability
to prevent or recover from an attack. Although botnets have been around for
years, the incidents involving this method of attack have increased.
Information gathered from sources like vendor sites, membership organiza-
tions, public sites, mailing lists, and other sources will better enable your orga-
nization to combat threats and improve security.
Using the resources available on the Internet will provide you with a wide
variety of tools. As we saw earlier in this chapter, disassemblers will take apart
malicious software to review how it works, and may provide information on
who is communicating with a botnet. In addition, log files and other samples
created by devices on your network will indicate botnet attacks, and provide
important information on how the attack occurred.
Membership organizations are another important resource, and allow you
to discuss situations with other professionals. Membership organizations pro-
vide privileged information to those who have met specific criteria to join,
and protect members through confidentiality agreements to ensure that what’s
said to the group stays with the group.These groups will also provide alerts to
threats, and information that may not be readily available elsewhere.
If an attack occurs on your site, you should seriously consider the involve-
ment of law enforcement. By having an investigation performed, the both-
erder or hackers involved in an attack may be apprehended, and subsequent
attacks may be prevented. If a decision is made to involve the police, it is
important that evidence be preserved so a case can be made against the
attacker. While the involvement of law enforcement was limited in previous
years, most law enforcement agencies now have specialists or entire units that
deal in investigating computer-related crimes and electronic fraud.

Download 6,98 Mb.

Do'stlaringiz bilan baham:
1   ...   334   335   336   337   338   339   340   341   ...   387




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish