Botnet

Group 3 IT 350
Definitions


Bot
−
−



Short for robot
Refers to an infected computer that takes
orders and reports back (Gassen et all,
2012)

Botnet
−

A network of bots


Botmaster
−
−



Also referred to botherder
The person that controls a botnet (Gassen
et all, 2012)

C & C Server
−

Command and control server used by a
botmaster to communicate with bots
(Gassen et all, 2012)
Attack Methods




Infections can occur through trojans and
worms
Clicking on infected links and opening
infected email attachments can cause
infections
M8 a2 Course Test
Strengths and Advantages


Summarize the special features and
advantages of the product being introduced
Next Steps of Action


Explain the steps that now need to be taken

More Related Content

PPT
Computer viruses
PPTX
Glosario
PDF
Promoting Environmental Sustainability through the use of Central Solar Charg...
PDF
5 reasons-your-mobile-app-will-fail
PDF
test
PPT
Part One - What is a Botnet?
PPTX
Py m
PPT
Powerpoint v3
Computer viruses
Glosario
Promoting Environmental Sustainability through the use of Central Solar Charg...
5 reasons-your-mobile-app-will-fail
test
Part One - What is a Botnet?
Py m
Powerpoint v3

Recently uploaded (20)

PPT
Geologic Time for studying geology for geologist
PPTX
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
PDF
How IoT Sensor Integration in 2025 is Transforming Industries Worldwide
PDF
1 - Historical Antecedents, Social Consideration.pdf
PPTX
TEXTILE technology diploma scope and career opportunities
PDF
Comparative analysis of machine learning models for fake news detection in so...
PPT
What is a Computer? Input Devices /output devices
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
Improvisation in detection of pomegranate leaf disease using transfer learni...
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
UiPath Agentic Automation session 1: RPA to Agents
PPTX
Configure Apache Mutual Authentication
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PDF
Developing a website for English-speaking practice to English as a foreign la...
PPTX
Modernising the Digital Integration Hub
PPT
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
PPTX
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
Geologic Time for studying geology for geologist
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
Credit Without Borders: AI and Financial Inclusion in Bangladesh
How IoT Sensor Integration in 2025 is Transforming Industries Worldwide
1 - Historical Antecedents, Social Consideration.pdf
TEXTILE technology diploma scope and career opportunities
Comparative analysis of machine learning models for fake news detection in so...
What is a Computer? Input Devices /output devices
Module 1.ppt Iot fundamentals and Architecture
Improvisation in detection of pomegranate leaf disease using transfer learni...
sbt 2.0: go big (Scala Days 2025 edition)
A contest of sentiment analysis: k-nearest neighbor versus neural network
NewMind AI Weekly Chronicles – August ’25 Week III
UiPath Agentic Automation session 1: RPA to Agents
Configure Apache Mutual Authentication
Convolutional neural network based encoder-decoder for efficient real-time ob...
Developing a website for English-speaking practice to English as a foreign la...
Modernising the Digital Integration Hub
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
Ad
Ad

M8 a2 Course Test

Editor's Notes