Reference no: EM131994177
Botnets and How they work
To individual users botnets are a nuisance because if one were to be using a computer infected with botnet software the machine's performance could be degraded and its reliability reduced.
For businesses, however, botnets represent a serious threat to the availability of information technology resources.
Requirements:
Put yourself in the position of a Chief Information Officer of a hospital who must gain support from the administration to purchase hardware and software that can detect and suppress the effects of a botnet infestation on the hospital's computer network.
The problem is that you are not certain the board of directors understands the threat and what impact it could have. Prepare a memo for the board explaining the following:
An introductory paragraph should be there so the CEO knows why you are writing him a memo.
• What is a botnet?
• How do computers become a part of a botnet?
• What impact would it have on the hospital's network if 50% of the computers were infected with botnet viruses?
• How can the damage of a botnet be detected / prevented / mitigated?
This week we will be discussing more kinds of attacks, this time in the form of malware, spyware, virus, and UCE. This is interesting information to know even from a standpoint of your own personal computer.
And if you ever wondered who these people are who send spam and viruses and malware and what their motivations are, we will be discussing that as well.
Requirements
Defined a botnet.
Explained how computers become a part of a botnet.
Explained what impact a botnet has on the hospital's network if 50% of the computers were infected with botnet viruses.
Explained how the damage of a botnet can be detected / prevented / mitigated.
Free of spelling, grammar, and punctuation errors.