Page 1468 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1468

strains is a program known as Cryptolocker.







                   Botnets


                  A few years ago, one of the authors of this book visited an
                  organization that suspected it had a security problem, but the
                  organization didn’t have the expertise to diagnose or resolve the

                  issue. The major symptom was network slowness. A few basic tests
                  found that none of the systems on the company’s network ran basic
                  antivirus software, and some of them were infected with a Trojan
                  horse.

                  Why did this cause network slowness? Well, the Trojan horse made
                  all the infected systems members of a botnet, a collection of
                  computers (sometimes thousands or even millions!) across the

                  internet under the control of an attacker known as the botmaster.

                  The botmaster of this particular botnet used the systems on their
                  network as part of a denial-of-service attack against a website that
                  he didn’t like for one reason or another. He instructed all the
                  systems in his botnet to retrieve the same web page, over and over
                  again, in hopes that the website would fail under the heavy load.
                  With close to 30 infected systems on the organization’s network,

                  the botnet’s attack was consuming almost all its bandwidth!

                  The solution was simple: Antivirus software was installed on the
                  systems and it removed the Trojan horse. Network speeds returned
                  to normal quickly.




               Worms

               Worms pose a significant risk to network security. They contain the

               same destructive potential as other malicious code objects with an
               added twist—they propagate themselves without requiring any human
               intervention.

               The internet worm was the first major computer security incident to
   1463   1464   1465   1466   1467   1468   1469   1470   1471   1472   1473