Network Security, Enterprise and Data-Center Firewall

You are here

Anatomy of a Botnet Report

One of the greatest challenges in Internet security today is how to contain the global scourge that is the botnet. Botnet authors and their criminal organizations are continuously developing innovative ways to recruit new victims into their networks and monetize them.

    Part of the difficulty in combating botnets is the lack of understanding around the following questions:
  • Who are the people behind them?
  • Why are they so prevalent, and what motives are behind their use?
  • How do attackers create and deploy a botnet infrastructure?
  • How to determine if a system is already part of a botnet?


This paper will answer those questions, as well as what is being done to combat them today.

 
 
 
 
 
 
 
 
 
Read more on: 

Please fill out the form below to access this content

By clicking submit you agree to the Fortinet Terms and Conditions & Privacy Policy.

Testimonials


Working with Fortinet, Verizon Business is giving customers an all-in-one solution that eases the burden associated with managing the complex security risks of the extended enterprise. In our pursuit to provide customers with excellent technologies to meet their specific needs, we are pleased to include Fortinet in our line-up for unified threat management.

Kerry Bailey
Vice President
Verizon Business Security Solutions