Académique Documents
Professionnel Documents
Culture Documents
SOLUTION
Page | 1
2. Drive-by Download Attacks
SOLUTION
3. Botnets
Page | 2
to attack secure systems, with each bot operating at a low attack frequency to
evade detection, but the aggregate performing a large brute-force attack.
SOLUTION
The first defense against botnets is to keep your own machines from becoming
botnet “Zombies,” by using techniques for preventing infection from worms and
viruses, including using antivirus software and keeping operating software up to
date. But even if all machines in your enterprise are kept clean, you can be
attacked when outside machines are directed to attack your web server or
infrastructure. Because of the scale, defense in this case requires a cooperative
approach including working with your ISP, system software vendors, and law
enforcement agencies.
4. Phishing Attacks
Solution
5. Exploit Kits
SOLUTION
6. Ransomware
Page | 4
crypto-currencies like Bitcoin, which allow ransom demands to be paid
anonymously.
SOLUTION
7. APT Threats
SOLUTION
Page | 5
IT professionals can improve defense by segmenting the network to isolate
critical data, using honeypots to trap internal attacks, and using application-
specific white lists to limit data access to only the few applications that should
be allowed.
THE END
PREPARED BY:
Page | 6