SEC 280 Week 7 Discussion | Assignment Help | Devry University
Week 7 Discussion
Week 7: Incident Handling
Surprisingly, many of us may be unknowing victims of botnets. Because of the rising sophistication of botnet schemes, your computer can become a zombie along with thousands of other computers that flood a victim's network and bring down servers. While the attack is going on, the botnet infects the network with spam, viruses, and malware. What are the four simple rules of stopping botnets on your personal PCs?
• What are some of the symptoms that would make you suspicious that your computer has been attacked?
• What part of a security incident should be logged?
1 attachments —
Ask a question