A Quick Guide to Combat Botnets
Botnets pose a common threat today for all enterprises. A botnet which is formed by the words ‘robot’ and ‘network,’ is a type of software application that has the capabilities to perform tasks on command. Hackers use Trojan viruses to hack into the security of various computers and also rearrange all the infected systems into a network of bots that can be controlled remotely. There have been multiple events in the past which includes the famous Equifax breach where private information of 143 million customers was hacked, and a similar case also occurred in the CIA. All these breaches have proved that no matter how sophisticated and powerful a defense mechanism is, it has a very high chance of getting compromised with the help of processes and techniques by hackers.
Most of the problems are due to the lack of vulnerability testing, feeble security practices, or too much dependent on anti-virus software that cannot provide strong protection. Another reason often seen is the lack of communication between the security team, IT administrators and the help desk. To deal with botnets, enterprises need to have an efficient incident-response approach. A detailed flight plan is also beneficial in addressing the network access, suspective users, and data management among others to counter the effects of a powerful malware attack.
Encryption, covert channels along with domain name system changes (known as ‘fast flux”) are highly effective against botnets. Applying firewall rules can also stop the inbound and outbound of traffic as well as implementing a stopgap network access list to prevent any malware attack. For bot removal, a simple anti-virus will not be sufficient to detect advanced malware attack and anomalous behavior and hence, in such cases,running multiple antimalware tools will be a better option.
By James Seevers, CIO & GM, Toyoda Gosei
By Bill Krivoshik, SVP & CIO, Time Warner Inc.
By Gregory Morrison, SVP & CIO, Cox Enterprises
By Alberto Ruocco, CIO, American Electric Power
By Bruce. D. Smith, SVP & CIO, Information Systems, Advocate...
By Adrian Mebane, VP-Global Ethics & Compliance, The Hershey...
By Graham Welch, Director-Cisco Security, Cisco
By Michael Watkins, Senior Product Director, Global Knowledge
By Bernd Schlotter, President of Services, Unify
By Patrick Hale, CIO, VITAS Healthcare
By Steve Bein, VP-GIS, Michael Baker International
By Jason Alan Snyder, CTO, Momentum Worldwide
By Mike Morris, CIO, Legends
By Louis Carr, Jr., CIO, Clark County
By Bill Dow, SVP and General Manager of Business Solutions,...
By Jim Whitehurst, CEO, Red Hat
By Darren Cockrel, CIO, Coyote Logistics, a UPS Company...
By Nathan Johnson, SVP and CIO, Werner Enterprises [NASDAQ:...
By David Tamayo, CIO, DCS Corporation
By Neil Hampshire, CIO, ModusLink Global Solutions, Inc....