INFO SHARE
Would you like to react to this message? Create an account in a few clicks or log in to continue.

IT- Word of the Day

Go down

IT- Word of the Day Empty IT- Word of the Day

Post by Admin Sat 24 Oct 2009, 17:51

hi Folks,

Its always good to share with you good stuff....


October 23, 2009 Published by WhatIs.com
Word of the Day
Overheard in the Tech Blogosphere:
Contact us - editor@whatis.com

"I suspect that a sizable percentage of small botnets are those developed by people who understand or are operating inside a business as employees or by criminal entities that have dug deep and gotten insider information...We've seen a growth in the number of sites that offer the sale of corporate documents that were extracted from the bots." - Gunter Ollmann
Issue Sponsored By:\ > SearchSecurity.com
IN THIS ISSUE:
> Word of the Day: micro-botnet
> Learning Center
> Recent Additions and Updates

ADVERTISEMENT

Intrusion Defense School is now in session
Your organization's ability to fend off spyware, viruses and increasingly savvier attacks hinges on the strength and cohesion of your intrusion defense strategy. Intrusion Defense School puts the pieces of intrusion defense -- antivirus, antispyware, IDS/IPS, etc. -- in perspective to help you implement a strategy that meets your organization's needs. Take advantage of this free course today!

TODAY'S WORD

micro-botnet
A micro-botnet, also called a mini-botnet or baby botnet, is a small network of Internet-connected computers that have been hijacked to attack specific companies or individuals within a company. Micro-botnets are often used in corporate espionage. Typically, the bots will monitor the enterprise network to identify key individuals and assets and target them for attack. The bots are used to seek out information like financial authentication passwords or data that can be sold to competitors.

Because there are usually fewer than one hundred computers to control in a micro-botnet, attackers can fine-tune an exploit to circumvent an enterprise intrusion detection system (IDS) or firewall. A successful micro-botnet infiltration often depends on social engineering because it's much easier to gain access and hide a small botnet's activities when the attacker has legitimate credentials. Red flags indicating the presence of a micro-botnet include new spikes in an individual's normal traffic patterns or quickly accelerating rights in a specific end user's permissions.

MORE INFO:
> According to Gunter Ollmann, VP of research at Damballa, small botnets account for 57 percent of all botnets.

LEARNING CENTER
Secret Word of the Day
This is a synonym for bot. (Hint: You might dress up as one for Halloween.) What's the secret word?
Answer

Acronym Challenge
KBA is an authentication scheme where the user is asked to answer at least one "secret" question during an online registration process. What does KBA stand for?
Answer

Tech Trivia
What popular Web-based site for transferring money was attacked by a botnet put together by former security administrator John Schiefer? (And yes, he's in jail!)
Answer

Writing for Business
We need to assign seating for the security seminar so _________ by next Friday.
a. RSVP
b. please RSVP
Which is correct?

RECENT ADDITIONS AND UPDATES
Get more out of your security event log data
Your network has plenty to say about your organization's threat posture. These three tips will help you get the most out of security log management tools.
Thwarting insider threats
Five simple measures you can take to protect your organization from insider attacks.

CONTACT US
Sales
For sales inquiries, please contact us at:
bmcgovern@techtarget.com

Editorial
For feedback about any of our articles or to send us your article ideas, please contact us at:
Editor@whatis.com


ABOUT THIS E-NEWSLETTER

This e-newsletter is published by WhatIs.com, part of the TechTarget network. TechTarget provides IT professionals with the resources they need to perform their jobs: Web sites, newsletters, forums, blogs, white papers, webcasts, events and more.
Copyright 2009 TechTarget. All rights reserved. Designated trademarks and brands are the property of their respective owners.

If you no longer wish to receive Word of the Day from WhatIs.com go to unsubscribe: http://WhatIs.techtarget.com/u?track=NL-34&em=dant_e%40eim.ae&uid=9244304&eid=732630&

Unsubscribe requests may take up to 24 hours to process; you may receive additional mailings during that time. A confirmation e-mail will be sent when your request has been successfully processed.

Please note, this will not affect any other subscriptions you have signed up for.

Contact Us:
WhatIs.com
Member Services
117 Kendrick Street, Suite 800
Needham, MA 02494
Contact: Webmaster@techtarget.com

When you access content from this newsletter, your information may be shared with the sponsors or future sponsors of that content as described in our Privacy Policy: PRIV LINK
alien
Admin
Admin
Admin

Number of posts : 21
Registration date : 2007-12-22

https://etex.forumotion.com

Back to top Go down

Back to top


 
Permissions in this forum:
You cannot reply to topics in this forum