Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Surprisingly, many of us may be unknowing victims of botnets. Because of the ris

ID: 3816631 • Letter: S

Question

Surprisingly, many of us may be unknowing victims of botnets. Because of the rising sophistication of botnet schemes, your computer can become a zombie along with thousands of other computers that flood a victim's network and bring down servers. While the attack is going on, the botnet infects the network with spam, viruses, and malware. What are the four simple rules of stopping botnets on your personal PCs?

What are some of the symptoms that would make you suspicious that your computer has been attacked?

What part of a security incident should be logged?

Explanation / Answer

Simple rules to stop botnets:

Though we can't stop all the botnets we can reduce them by following.

- Upgrading OS from lower bit size to higher i.e 32 to 64 as most of the bots will be compatible with 32 bits

- Using stronge passwords

- Bringing awareness among people about phishing attacks and all other best practices

- Updating the browser and applying Operating system patches

Symptoms of suspicious activity:

- Dramatic change in the internet and processing speed

- Unexpected computer behavious and frequently stops responding

- Error messages from operating systems as it detects some of the viruses

- Advertisements

- Missing/ new files

What part of a security incident should be logged?