Skip to main content

What is a Botnet - Why do I care?

Today every business is an internet business.  The performance of any business is directly related to the capability and performance of IT.  Therefore, we must all take cyber security seriously.  

Let’s start with a botnet by breaking down the word itself.  The first syllable, “bot” is short for robot. The second syllable “net” is from the word network.  A botnet is formed when a hacker writes a computer program that will breach security on a single computer.  It does not stop there.  This computer program called a virus has the capability to take over that computer that it just hacked into. It does not stop there either because this is not good enough for the cybercriminal.  With a botnet, the virus will move from one computer to another, take control of each and then connect all of the disparate computers into a powerful system or network of control.  This is known as a botnet.

Cyber criminals are control freaks.  They will sometimes create a virus that controls thousands or even millions of computers.  The more computers that the criminal gets control over the bigger their botnet becomes and the more power they have to do harm.  There has been a bit of glory given in the past and even today for a hacker that has this capability to do harm on a mega scale.  Today they can even change the course of the entire world.   The hacker keeps going and revels in the number of controlled computers that they can get into their botnet.  When the botnet gets very large it is referred to as a zombie network and is sometimes sold to other cyber criminals so that they can grow their own botnet or zombie.
  
Every business, every home and every internet device is vulnerable.  The internet of things has fueled flames for botnets and zombies and is yet one more avenue for the cybercriminal to get control over devices, access proprietary/personal information, to sell the information, propagate SPAM and more.

Installing security protection on your computer and business systems is crucial but many do not consider their phones, their XBOX, or other internet enabled devices such as thermostats, cars, lights, refrigerators and other appliances. All can be connected through the “Internet of Things” and all can be broken into to become a part of or an avenue to expand a botnet.

Education and Awareness

The public is not aware. Last year a cyber-attack occurred that would randomly call people and ask questions like “Can you hear me ok?”. When the person answers “YES”, then the program records your voice and uses it to confirm the opening of a new credit card or another potentially dangerous ploy.  The public should become aware of the risk and how to avoid cyber-attacks with security monitoring apps, and to keep apprised of what is critical information and not give away key information unintendedly.
  
Business and government agencies will need to be willing to change their culture. They will need to integrate teams of specialists, build resilient/rugged software and more.  Every business and their employees should be cyber experts. More than that, they will have to CHANGE the way that they think about requirements, development and deployment of products and services. They will need to consider skillsets for new roles such as the DevOps Test Engineer (DTE) and more.   Educate yourself and inspire others. It is a new world! 


For training and certification regarding-à  DTE, DevOps and Agile…

Comments

Popular posts from this blog

Four Service Characteristics

Recently I came across several articles by researchers and experts that laid out definitions and characteristics of services. ITIL provides us with a definition that can help drive the creation of value-laden services: A means of delivering value to customers by facilitating outcomes customers want to achieve without the ownership of specific costs and risks. An area that ITIL is not so clear is in terms of service characteristics. Several researchers and experts put forth that services have four basic characteristics (IHIP): Intangibility—Services are the results of actions not things. They have no physical presence and represent a logical set of elements. One way to think of service is “work done for others.”  Heterogeneity—Also known as “variability”; services are unique items because of the mechanisms used to deliver services, which is people. Because the people element adds variability, the service is variable. This holds true, especially for the value proposition—not eve...

What Is A Service Offering?

The ITIL 4 Best Practice Guidance defines a “Service Offering” as a description of one or more services designed to address the needs of a target customer or group.   As a service provider, we can’t stop there!   We must know what the contracts of our service offering are and be able to put them into context as required by the customer.     Let’s explore the three elements that comprise a Service Offering. A “Service Offering” may include:     Goods, Access to Resources, and Service Actions 1. Goods – When we think of “Goods” within a service offering these are the items where ownership is transferred to the consumer and the consumer takes responsibility for the future use of these goods.   Example of goods that are being provided in the offering – If this is a hotel service then toiletries or chocolates are yours to take with you.   You the consumer own these and they are yours to take with you.      ...

What is the difference between Process Owner, Process Manager and Process Practitioner?

This article was originally published in 2015. With the Introduction of ITIL 4, some of this best practice has changed. See  ITIL 4 and the Evolving Role of Roles . Updated Definitions in ITIL 4: Process Owner: In ITIL 4, the concept of 'processes' has expanded into broader 'practices.' Consequently, the Process Owner is now often referred to as the 'Practice Owner.' This individual is accountable for the overall design, performance, integration, and improvement of a specific practice within the organization. They ensure that the practice achieves its intended outcomes and aligns with the organization's objectives. Process Manager: Now commonly known as the 'Practice Manager' in ITIL 4, this role is responsible for the day-to-day management of the practice. The Practice Manager ensures that activities are carried out as intended, manages resources assigned to the practice, and oversees the practitioners performing the work. Process Practit...