In: Computer Science
**PLEASE ANSWER ALL QUESTIONS**
Ananada is sitting on a train and overhears someone on his phone bragging that he has a massive network of computers at his fingertips that have been compromised with some form of malware. He tells the person on the other end of the call that they can have all these computers attack a target in unison. Which of the following terms might describe the person whose conversation she overheard?
a. |
Bot herder |
|
b. |
Shepherd |
|
c. |
Alien wrangler |
|
d. |
Zombie |
Tyrese has just been hired as a cybersecurity analyst at a major hospital in Colorado. Which of the following regulations might he need to be familiar with?
a. |
ICO |
|
b. |
CCPA |
|
c. |
PIPEDA |
|
d. |
HIPAA |
Albrecht has noticed a number of clients on the network attempting to contact the same external IP address at a constant rate of once every five minutes over the past 72 hours. Which of the following might be the cause of his concern?
a. |
The computers may have formed a distributed computing configuration that allows them to work as a single command and control system. |
|
b. |
The computers are performing a port scan against a victim computer. |
|
c. |
The computers may be infected with malware that has made them part of a botnet. |
|
d. |
The computers are currently taking part in a DDoS attack against the destination IP address. |
Answer 1:- Bot herder
Explanation:-
A bot herder is a hacker that seeks out vulnerable computers and infects them so that they can be controlled as a botnet.The main business of a bot herder is infecting new computers with malware. Because infected systems are constantly being detected, the eventual discovery is built into the business model.
A botnet is a network of infected computers that are enslaved to a single command & control center.
The computers in a botnet act in unison, so that they all do the same thin simultaneously.
Malicious hackers use botnets for some of the nefarious cybercrimes out there, such as DDoS attacks, mass farming for Bitcoin or for gathering user data.
Answer 2:- HIPAA
Explanation:-
HIPAA (Health Insurance Portability and Accountability Act) is United States legislation that provides data privacy and security provisions for safeguarding medical information.Acronym that stands for the Health Insurance Portability and Accountability Act, a US law designed to provide privacy standards to protect patients' medical records and other health information provided to health plans, doctors, hospitals and other health care providers. Developed by the Department of Health and Human Services, these new standards provide patients with access to their medical records and more control over how their personal health information is used and disclosed. They represent a uniform, federal floor of privacy protections for consumers across the country.
Answer 3:- The computers may be infected with malware that has made them part of a botnet!
Explanation:-
Botnet malware can be programmed to send the packages or data to the external attacker or ip with in a duration of time like in question number 3 case it is programmed to send the clients data to the external computer or ip in every 5 min. and Albrecht noticed it after 72 hours.
Hope you are satisfied with the answers and the explanation.
Thanks please do upvote.
Have a nice day.