Cybercriminals create autonomous applications called bots that can infect networks in a variety of ways, via Web or email. A botnet is a network of these applications that are capable of acting on instruction once they are triggered. This happens when a bot, that may be dormant in your network,, “calls home” via any port. This allows perpetrators to control infected computers via their command and control hosts residing outside your network. In a study of 130 large companies done by TrendMicro, they found that 100% of them already had bots in their networks. That’s why a multilayered approach...
More Here
You need to be a member of The Data Center Professionals Network to add comments!
Join The Data Center Professionals Network