1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GrogVix [38]
3 years ago
11

Discuss any three Networked Applications targeted/attacked by Botnet

Computers and Technology
2 answers:
siniylev [52]3 years ago
7 0

Answer:

The three applications attacked by Botnet can be attacks drive-by downloads, e-mail or exploiting some vulnerability in browsers such as Google Chrome or Internet Explorer.

Explanation:

Botnet is the name by which any group of infected computers is called and which are controlled by a remote attacker. A hacker or a group of them makes a botnet using malware that infects a large number of computers. Computers that are part of the botnet are known as "bots."

Hackers use two methods to infect computers and make them part of their botnet: one is drive-by downloads and email attacks. In the first, the process needs the attacker to find a web page with a vulnerability. In this way, the hacker loads the malicious code on the page and exploits such vulnerability as Google Chrome or Internet Explorer. The malicious code redirects the user's browser to a site controlled by the hacker, from where the bot code is downloaded and installed on the computer. Another type of attack is the sending of a large amount of spam, where a Word or PDF file with a malicious code or a link to a page where the code is hosted is attached.

storchak [24]3 years ago
5 0

Answer:

 Botnet is define as the number of the internet connection where each devices in the botnet connection run one and more than one bot in the network. It is basically use to performed DDOS ( Distributed denial of service) attack in the system, steal data and also allow the hacker to access different devices.

 The three networked applications that are targeted by the botnet is that:

  • Many e-mail applications are basically spammed by the users for entering the login credential by using the fake websites.
  • DDOS ( Distributed denial of service) attack is also one of the main application that are attacked by the botnet in the system.
  • Many types of banking applications that theft the data or important information which include users login details and credit or debit cards details that are hacked by the attackers in the system.  

You might be interested in
Is Bob Lazar telling a lie/withholding information?
Anon25 [30]

Answer:

I think he may be a nut, but I'm not sure, there's little evidence of what he says to be true.

6 0
3 years ago
Sets of keywords and symbols that help refine internet search requests are called _____. boolean operators microsoft operators a
Kay [80]
Boolean operators, it uses the word "and","or" and "not" with keywords to control the search. For example if you search for health and food, the search engine will give a narrow search focusing on the two keywords. Using "or" with keywords will give much broader results. Using a "not" will remove one keyword from the search, ex. windy not rainy will give results of the keyword windy only. An asterisk on the other hand, gives wider results with variations.
3 0
3 years ago
The blank one is a close up of what logo?
fredd [130]

Answer:

These are company brand logo

Explanation:

These are company brand logo, and you will find it on all products of that company, plus generally you will find them on each page of their website as well as mobile application.

6 0
3 years ago
What's the first step in being a wise consumer of media?
BARSIC [14]
Pay attentions to what you are watching and or listening to.
3 0
3 years ago
Read 2 more answers
What best describes the difference between careers and industries?
Rasek [7]

Answer:

c

Explanation:

big brain

3 0
3 years ago
Other questions:
  • To keep information beyond reach of unauthorized users, is to keep the information _____. Group of answer choices simple verifia
    7·1 answer
  • Can you help me correct a sentence?
    13·1 answer
  • What does a network backbone do? allows data to be delivered more quickly and efficiently makes data transfer from the cloud mor
    14·2 answers
  • The point at coordinates (2, -18) is in what direction from the origin?
    7·1 answer
  • What software that allow for one-click performance profiles for msi video card??
    5·1 answer
  • Hacker is a person who illegally breaks into a system or network without any authorization to destroy, steal sensitive data or t
    14·1 answer
  • A research team is studying parallel computing. They want to run parallel processes without having to use multiple processors. H
    15·2 answers
  • Rosa is a high school freshman with no savings. She wants to buy a new smartphone in a few months for $300. Which account type b
    9·2 answers
  • Which of the following is the best example of an installation issue?
    6·2 answers
  • Zoe wants to use an image file that will allow her to preserve all of the original
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!