From the course: Cisco Network Security: Core Security Concepts

Unlock the full course today

Join today to access over 22,400 courses taught by industry experts or purchase this course individually.

Solution: Understanding botnets

Solution: Understanding botnets - Cisco Tutorial

From the course: Cisco Network Security: Core Security Concepts

Start my 1-month free trial

Solution: Understanding botnets

- [Instructor] Okay. So the first question was, what is a botnet? Now, a botnet is thousands of computers. Now, literally hundreds of thousands and in some cases, millions of computers that are referred to as zombies that are under the control of a botnet command and control server. Think of it as the mothership. Now, why are botnets created? Well, they're used to launch a distributed denial-of-service of service attack or a DDoS, it could also be used for bitcoin mining, sending spam or any other malicious action. Keep in mind, if you have hundreds of thousands of computers under your control, there's a lot of things you can do. So the next question is what is a command and control botnet server? It's also called a C and C. This is what is used to maintain communications with the army and the zombie army can include anything that's computerized including mobile devices, laptops, and Internet of Things. And so well…

Contents