Gamified Intelligent Cyber Aptitude and Skills Training (GICAST)
Gamified Intelligent Cyber Aptitude and Skills Training (GICAST)

Start this free course now. Just create an account and sign in. Enrol and complete the course for a free statement of participation or digital badge if available.

Free course

Gamified Intelligent Cyber Aptitude and Skills Training (GICAST)

2.7 Botnets

This section is part of the amber pathway.

Download this video clip.Video player: ou_futurelearn_cyber_security_vid_1006.mp4
Skip transcript

Transcript

COMPUTER
Hello there. Are you about to click on a link you're not sure about? Well I hope you've taken care. Because if not, I could quite easily drop a Trojan horse, or a drive-by download, or some other sinister malware into your laptop and turn your computer into a zombie. Don't worry, it's not one of those zombies.
But it does mean I could take control of your computer without you knowing and either steal your identity or make your computer do things it shouldn't, like sending out spyware or spam. I can make it happen without you noticing. And it's not only your computer I can do that to. I can make a whole network of them which is called a botnet, or a zombie army.
So, I guess you'll want to know how to avoid it all, won't you? Well, the first thing to do is not to click on any unsafe links or download any attachments that you're not sure of. But if you're worried you may be part of a botnet, check if your computer is running slower than normal, or if starts behaving erratically. Or you might notice some unusual internet activity that you weren't expecting.
You could check your Task Manager to see what it's up to. Disconnect from the network and see if the computer behaves differently. Looks like you've got a problem. Of course your virus scanner should be telling you as well.
So what can you do to stop it happening? Uh oh, almost right. You need to make sure your antivirus and anti-spyware software is up to date. But use a reputable source. Rogue antivirus software could be malware in disguise. And remember, though that helps, it can't save you if you go and click on an unsafe link anyway. You're learning, but give it a full scan. And make sure your firewall is on too. And, if all else fails, ask an expert to help you. No need to thank me. I was just doing my j-.
[TYPING]
End transcript
 
Interactive feature not available in single page view (see it in standard view).

You heard about botnets briefly in Week 1, when we said that botnets are created using malware that give an attacker control over a group of computers and commonly use them to gather information from the computers (e.g., usernames and passwords), launch attacks against others. These attacks might be sending spam emails, or flooding a website with so many requests for content that the server cannot cope, which is known as a denial-of-service attack.

A single piece of malware can cause enormous damage, but when thousands, or even millions of computers run the same program, their effects can be devastating. So a botnet is a group of computers that coordinate their activity over the internet. There are a number of harmless botnets used for such purposes as the Internet Relay Chat (IRC) text messaging program, but the vast majority are created by malware.

Botnets spread through viruses and worms and once installed on the victim’s computer they use the internet to make contact with a control computer. At this point, the infected computer (often called a zombie) will do nothing more except periodically check for instructions from the control computer. Over time, more and more computers are recruited to the incipient botnet until it may contain tens of thousands of zombies, but they don’t raise suspicion as they appear to be doing nothing.

At some point in the future, the control computer will issue a command for the botnet to wake up and begin doing something. Often the people who created the botnet itself have either sold or rented the botnet to another group who want to use its capabilities.

Botnets have been used to flood the internet with spam messages, to commit fraud against advertisers and to perform so-called distributed denial-of-service attacks on companies and governments. Botnets are so large, and so widely distributed across the internet that they can be very hard to tackle and the effects of a coordinated attack on critical parts of the network can mean even very large websites struggle to remain online while the botnet targets their computers.

CYBER_B2

Take your learning further

Making the decision to study can be a big step, which is why you'll want a trusted University. The Open University has 50 years’ experience delivering flexible learning and 170,000 students are studying with us right now. Take a look at all Open University courses.

If you are new to University-level study, we offer two introductory routes to our qualifications. You could either choose to start with an Access module, or a module which allows you to count your previous learning towards an Open University qualification. Read our guide on Where to take your learning next for more information.

Not ready for formal University study? Then browse over 1000 free courses on OpenLearn and sign up to our newsletter to hear about new free courses as they are released.

Every year, thousands of students decide to study with The Open University. With over 120 qualifications, we’ve got the right course for you.

Request an Open University prospectus371