Discussion and responses_1_ETC
Subject: Emerging Threats & Countermeasures
Topic: How can correlating data aid in the detection of worm and botnet attack
1) Discussion Topic (Around 500 to 600 words) need to submit in next 2 days.
2) Respond to at least 2 other students with at least a 100-word reply about their Primary Task Response regarding items you found to be compelling and enlightening. To help you with your discussion, please consider the following questions:
What did you learn from your classmate’s posting?
What additional questions do you have after reading the posting?
What clarification do you need regarding the posting?
What differences or similarities do you see between your posting and other classmates’ postings?
Reference:
* Amoroso, E. G. (2012). Cyber attacks: protecting national infrastructure. Elsevier.
Solution Preview
Topic 1_PBK
In response to this, it is true that most of the cyber-criminals make use of the botnets to initiate different forms of attacks. The attacks include unauthorized access of data and information from offices or other places which may be used for executing criminal activities.
(390 words)