Computer Network Security

A botnet consists of a number of compromised machines that are all controlled by an evil botmaster [39, 146].

a. Most botnets are controlled using the Internet Relay Chat (IRC) protocol. What is IRC and why is it particularly useful for controlling a botnet?

Don't use plagiarized sources. Get Your Custom Essay on
Computer Network Security
Just from $13/Page
Order Essay

b. Why might a covert channel be useful for controlling a botnet?

c. Design a covert channel that could provide a reasonable means for a botmaster to control a botnet.

Ross Anderson claims that “Some kinds of security mechanisms may be worse than useless if they can be compromised” [14].

a. Does this statement hold true for inference control? Why or why not?

b. Does this hold true for encryption? Why or why not?

c. Does this hold true for methods that are used to reduce the capacity of covert channels? Why or why not?

Place Order
Grab A 14% Discount on This Paper
Pages (550 words)
Approximate price: -
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Try it now!

Grab A 14% Discount on This Paper

Total price:
$0.00

How it works?

Follow these simple steps to get your paper done

Place your order

Fill in the order form and provide all details of your assignment.

Proceed with the payment

Choose the payment system that suits you most.

Receive the final file

Once your paper is ready, we will email it to you.