Skip to main content

What is a Botnet - Why do I care?

Today every business is an internet business.  The performance of any business is directly related to the capability and performance of IT.  Therefore, we must all take cyber security seriously.  

Let’s start with a botnet by breaking down the word itself.  The first syllable, “bot” is short for robot. The second syllable “net” is from the word network.  A botnet is formed when a hacker writes a computer program that will breach security on a single computer.  It does not stop there.  This computer program called a virus has the capability to take over that computer that it just hacked into. It does not stop there either because this is not good enough for the cybercriminal.  With a botnet, the virus will move from one computer to another, take control of each and then connect all of the disparate computers into a powerful system or network of control.  This is known as a botnet.

Cyber criminals are control freaks.  They will sometimes create a virus that controls thousands or even millions of computers.  The more computers that the criminal gets control over the bigger their botnet becomes and the more power they have to do harm.  There has been a bit of glory given in the past and even today for a hacker that has this capability to do harm on a mega scale.  Today they can even change the course of the entire world.   The hacker keeps going and revels in the number of controlled computers that they can get into their botnet.  When the botnet gets very large it is referred to as a zombie network and is sometimes sold to other cyber criminals so that they can grow their own botnet or zombie.
  
Every business, every home and every internet device is vulnerable.  The internet of things has fueled flames for botnets and zombies and is yet one more avenue for the cybercriminal to get control over devices, access proprietary/personal information, to sell the information, propagate SPAM and more.

Installing security protection on your computer and business systems is crucial but many do not consider their phones, their XBOX, or other internet enabled devices such as thermostats, cars, lights, refrigerators and other appliances. All can be connected through the “Internet of Things” and all can be broken into to become a part of or an avenue to expand a botnet.

Education and Awareness

The public is not aware. Last year a cyber-attack occurred that would randomly call people and ask questions like “Can you hear me ok?”. When the person answers “YES”, then the program records your voice and uses it to confirm the opening of a new credit card or another potentially dangerous ploy.  The public should become aware of the risk and how to avoid cyber-attacks with security monitoring apps, and to keep apprised of what is critical information and not give away key information unintendedly.
  
Business and government agencies will need to be willing to change their culture. They will need to integrate teams of specialists, build resilient/rugged software and more.  Every business and their employees should be cyber experts. More than that, they will have to CHANGE the way that they think about requirements, development and deployment of products and services. They will need to consider skillsets for new roles such as the DevOps Test Engineer (DTE) and more.   Educate yourself and inspire others. It is a new world! 


For training and certification regarding-à  DTE, DevOps and Agile…

Comments

Popular posts from this blog

The Four Ps of Service Design - It’s not all about Technology

People ask me why I think that many designs and projects often fail. The most common answer is from a lack of preparation and management. Many IT organizations just think about the technology (product) implementation and fail to understand the risks of not planning for the effective and efficient use of the four Ps: People, Process, Products (services, technology and tools) and Partners (suppliers, manufacturers and vendors). A holistic approach should be adopted for all Service Design aspects and areas to ensure consistency and integration within all activities and processes across the entire IT environment, providing end to end business-related functionality and quality. (SD 2.4.2) People:   Have to have proper skills and possess the necessary competencies in order to get involved in the provision of IT services. The right skills, the right knowledge, the right level of experience must be kept current and aligned to the business needs. Products:   These are the technology managem

What Is A Service Offering?

The ITIL4 Best Practice Guidance defines a “Service Offering” as a description of one or more services designed to address the needs of a target customer or group .   As a service provider, we can’t stop there!   We must know what the contracts of our service offering are and be able to put them into context as required by the customer.     Let’s explore the three elements that comprise a Service Offering. A “Service Offering” may include:     Goods, Access to Resources, and Service Actions Goods – When we think of “Goods” within a service offering these are the items where ownership is transferred to the consumer and the consumer takes responsibility for the future use of these goods.   Example of goods that are being provided in the offering – If this is a hotel service then toiletries or chocolates are yours to take with you.   You the consumer own these and they are yours to take with you.               Note: Goods may not always be provided for every Service Offe

What is the difference between Process Owner, Process Manager and Process Practitioner?

I was recently asked to clarify the roles of the Process Owner, Process Manager and Process Practitioner and wanted to share this with you. Roles and Responsibilities: Process Owner – this individual is “Accountable” for the process. They are the goto person and represent this process across the entire organization. They will ensure that the process is clearly defined, designed and documented. They will ensure that the process has a set of Policies for governance. Example: The process owner for Incident management will ensure that all of the activities to Identify, Record, Categorize, Investigate, … all the way to closing the incident are defined and documented with clearly defined roles, responsibilities, handoffs, and deliverables. An example of a policy in could be… “All Incidents must be logged”. Policies are rules that govern the process. Process Owner ensures that all Process activities, (what to do), Procedures (details on how to perform the activity) and the