Running Head: Global Approach To Cybersecurity 1
Running Head: Global Approach To Cybersecurity 1
Name:
Institution:
GLOBAL APPROACH TO CYBERSECURITY 2
Scores
The Small World Simtray Report earned a score average of 50% after three tries (50%,
49%, and 50%). Lesson leant is the events documented associated with botnets have a significant
impact on the world cybersecurity technologies. s learnt are technologies and events that have
Documented Technologies
The Small World Simtray featured lessons on botnets, which are robots that can connect
to the internet for network access. For instance, botnets have the capability to link to each other
via internet connection and makes it possible to operate within a single virtual local area network
(LAN) without detection. Even more astounding is the ability of the botnets to link to other
botnets via the internet connection, making it possible for a single virtual local area network
(LAN) if feasible. Botnets are advanced and can affect computers easilyThis technology looks to
be advanced since computers are not configured to conduct botnets detectionthese operations
autonomously unless the end user is a computer programmer. The Simtray also highlighted
ElectroMagnetic Pulse (EMP), which is basically triggered by High Energy Radio Frequency
(HERF). The EMP is made up of two parts: the magnetic section and the electrical section,
which work together to create the EMP product. When the components operate together, they
generate a steady sinusoidal amplitude wave pattern offset by a fixed frequency. The
technologies documented are mostly employed in high grade military gadgets and equipment for
communication and navigation and have an impact on global cybersecurity. This is a technology
GLOBAL APPROACH TO CYBERSECURITY 3
that is mostly employed by military forces for communication and navigation, as well as high-
Policies
According to the Simtray report, some of the events associated with botnet can have a
significantthere are occurrences that may have an impact on global cybersecurity. Botnets had
attacked Alzei's network, prompting its IT personnel to investigate the problem. The extent to
which the IT crew went to troubleshoot the breach wore them out, and in retrospect, this problem
should have been averted. If measures had been put in place to segregate the corporate network
or enhance the firewall, the problem may have been avoided. When subjected to an assault, all
procedures dealing with the attack, including incident response, detection, confinement,
elimination, and recovery, should be properly defined. Foreign policies may include a Bring
Your Own Device (BYOD) policy to limit the danger of enabling outside attackers to infect the
firm network. The strict implementation of the policies is the best approach to ensure the impact
Brazil
Country/Region: Brazil
Cyber Culture – (How Cybersecurity Cyber Legal Response to
does the country view Threats Perspective/ Cyber Cyberterrorism/Recruiting
cyber threats? Is this Economic
consistent with the Perspective
general country
culture?)
Brazilian cyber culture Theft of data Exclusive Unless cyberterrorism is
is largely focused on jurisdiction of law directed towards national or
GLOBAL APPROACH TO CYBERSECURITY 4
Ukraine
Country/Region: Ukraine
Cyber Culture – (How Cybersecurity Cyber Legal Response to
does the country view Threats Perspective/ Cyber Cyberterrorism/Recruiting
cyber threats? Is this Economic
consistent with the Perspective
general country
culture?)
Ukraine's priority is to Internet and The rule of law and Ukraine's Cyber Security
defend the important computer fraud the protection of Strategy aims to establish
interests of man and human and civil circumstances for the safe
citizen, society, and state rights and liberties operation of cyberspace, as
in cyberspace through well as to apply
the coordinated use of a cyberspace to the
complex combination of advantage of people,
institutional, legal, and society, and the state.
information measures.
Computer theft Establishing International cooperation
Internet and democratic civilian to foster confidence and
computer fraud control over mutual trust in cyber
lawfully formed security, as well as the
military units and development of
law enforcement partnerships to combat
agencies engaged cyber threats, the
in cyber security centralization of initiatives
operations in the investigative process
and prevention of
GLOBAL APPROACH TO CYBERSECURITY 6
distribution of
personally
identifiable
information
Cyber warfare
Cyber crime
Cyber terrorism
Cyber crime
Cyber terrorism
Australia
Country/Region: Australia
Cyber Culture – (How Cybersecurity Cyber Legal Response to
does the country view Threats Perspective/ Cyberterrorism/Recruiting
cyber threats? Is this Cyber Economic
consistent with the Perspective
general country
culture?)
The government and Cyber terrorism Concentrated on Cybersecurity Incident
the general public are the financial Mitigation Strategy
becoming more aware sector
of changing cyber
dangers and their
capacity to identify,
monitor, respond to,
and report cyber
security problems.
Social media The Australian Government
Information Security
Manual was created by the
GLOBAL APPROACH TO CYBERSECURITY 8
ACSC.
Router scanners
Malware Concentrated on
the financial
sector
IoT
Cyber warfare
Ransomware The Australian Government
Information Security
Manual was created by the
ACSC.
Cyber terrorism
Brazil
Brazilian cyber culture is mainly concerned with military measures to counter cyber
warfare and cyberattacks attempts by other countries. Over the last 15 years, the usage of
interconnected information systems has expanded as the government has provided IT producers
technology. In the cyber environment, some of the challenges Brazil encounter include dData
espionage, and cybercrime are some of the challenges that Brazil faces. Brazil cybersecurity
sector is set to grow in the next 10 years with the government now focused on will grow
increasingly focused on enhancing cybersecurity awareness and education across all sectors
among its inhabitants during the coming decade. Malware attacks, such as the Bolware family of
Malware, are one of the most serious problems Brazil is now facing. This very effective virus
GLOBAL APPROACH TO CYBERSECURITY 9
infected over 192,227 bots and cost over $3.75 billion in damages (Paganini, 2014). The current
efforts by Brazil government to provide a secure cyberspace is also supported by NATO and
United Nations.
NATO and the United Nations have made major efforts to improve cybersecurity
Cybercrime, an international pact for combating cybercrime. In 2001, the United Nations
advocated worldwide initiatives and collaboration to assist member countries in dealing with
cybercrime. NATO has been working with its member countries to set worldwide minimum
cybersecurity technological and legal requirements. It is in the best interests of not just NATO
and the UN to aid their members with stronger cybersecurity, but also of all nations to develop
their cybersecurity capabilities (Brown, 2021). I would recommend that the Brazilian
business. The government should also, as well as undertake a public education campaign to raise
Australia
The Australian government has been focused on attempts to improve their country's
cybersecurity capabilities. The large distances between Australia's population centers, which are
predominantly located in the continent's coastline areas are one of the continent'scountry’s most
significant and distinctive issues. Some of the cyber threats that Australia confronts include
Australia to China and North Korea might be the driving force behind the need to increase
cybersecurity capabilitieschange. State-sponsored actors from both countries will continue cyber-
GLOBAL APPROACH TO CYBERSECURITY 10
espionage operations to get access to data critical to Australia, the United States, and NATO.
NATO and the United Nations have made major efforts to improve cybersecurity capabilities in
Australiamember countries and throughout the world. In 2001, the United Nations advocated
worldwide initiatives and collaboration to assist member countries in dealing with cybercrime
(Brown, 2021). The Australian government has benefited significantly due to its UN membership
and as an ally of NATO. NATO has been working with its member countries to set worldwide
Ukraine
When it comes to culture, Ukraine has various distinguishing features. For one thing,
Ukraine's geographical location makes it a proxy for nation-state actors and criminals from both
Russia and the West. Furthermore, criminal organizations that emerged during the Soviet
Union's decades of existence have swiftly adapted to the cyberworld and the chances it provides.
Cyberthreats, cyberwarfare, cyberterrorism, computer and online fraud, and hacktivism are some
of the risks that Ukraine faces (Jakub, 2022). The most significant shift for Ukraine over the next
decade will be the improved protection that comes with being a NATO member. Cooperation
with other member countries and a focus on legal proceedings against perpetrators within
NATO and the United Nations have made major efforts to improve cybersecurity
capabilities in member countries and throughout the world. International initiatives have
included the Council of Europe Convention on Cybercrime, an international pact for combating
cybercrime. The ongoing Russian invasion has put key vital infrastructure at risk, and Ukraine
will expand its spending in implementing security measures for network systems supporting
According to Muggah and Thompson (2018), Brazil is continuously ranked first in the
world in terms of cybercrime, including botnets, banking fraud, and financial malware. Brazil's
government has prioritized protecting itself against cyber espionage or warfare performed by
other countries, rather than securing its networked systems to protect enterprises, education, and
trade. Among the cybersecurity dangers confronting Brazil are, but are not limited to: Spam,
database theft, financial crimes, identity theft, cyber terrorism, cyber espionage, hacktivism,
cyber warfare, and organized crime are all examples of cybercrime. "One of the most serious
hazards to Brazilian internet users is finance malware, a type of cybercrime that has expanded
due to the country's broad use of online banking" (Teixeira, 2015). Bolware, a type of malware
that targets Brazil's Boleto payment system, is a prominent example of malware that targets
Brazilian users.
Characteristics of Botnets
The botnet includes bot, command and control servers, and the controller or "botmaster"
comprise a botnet. Botnets have recently "become the largest danger to cybersecurity and have
Botnet? n.d.). Botnets are not restricted in size and can range from massive botnets with
thousands of bots to small-scale botnets with only a few bots. Botnets are designed to facilitate
and carry out harmful operations in computer networks. Botmasters utilize a variety of attack
tactics to infect new targets, including spam emails, instant chats, P2P networks, malicious
Botnet programs first appeared in 1999, with the release of a Trojan named "Sub7" and a
worm named "Pretty Park," both of which were distributed over Internet Relay Chat (IRC)
sessions. Botnets were first utilized by Internet Relay Chat operators to do automatedconduct
automated tasking on behalf of the botowners. Botnets have advanced in recent years by using
technological breakthroughs in a harmful manner. While malware targeting PCs and servers is
still used to form classic botnets, botnet builders have primarily shifted to botnets made up of
IoT devices. Furthermore, modern botnets prefer to deliver orders via peer-to-peer
The botmaster, command and control servers, and bots are the core technological
components of a botnet. The botmaster is the person in charge of botnet command and control
for remote process execution (Radware, n.d.). A command and control server, according to
Rouse and Hahn (n.d.), is a computer that sends commands to digital devices infected with
various forms of malware. A bot is a software program that has been designed to carry out
certain activities.
far more aggressive and advanced capability. This sort of future technology will search and
acquire intelligence information quicker than botnets. The advancement of technology such as
the Internet of Things (IoT), which makes conveniences more manageable and accessible, will
messages on Internet Relay Chats. Botnets now have more in-depth malevolent intentions, such
as stealing confidential data and passwords, attacking networks, taking over weak systems for
Botnet Attack Methods: Dedicated servers with numerous capacities and safeguards may have
been hired for various reasons. For one day, a targeted DDoS service was provided. The ability
to deliver spam to targets via email, SMS, ICQ and Skype is one of the reasons. In addition,
botnet attack strategies would include infecting vulnerable computer systems throughout the
world and turning them into zombies to make the botnet attack more successful.
Botnet Size: Statistic inference is typically the only method for calculating the size of Botnets.
The number of Internet protocols (IPs) that communicate in a certain time period represents bot
behavior online. The frequency of contact for bot activity reflects the activities of the bot master.
Botnet File Attributions: The capacity to identify malware by studying file hash values.
Botnet Network Attributions: The ability to monitor IP packets, including the type of software
supported by the packet, the protocol utilized, packet durations, and the originating address.
facilitate dispute resolution and equitable clean-up and restitution. Even if we can connect an
attack to a specific computer or device in a certain nation, we cannot always attribute it to that
the previous ten years. For some instances, technology has gotten more stealthy and harder to
detect. Botnets are mostly used to prevent the attacker from being detected. Botnets can fool
GLOBAL APPROACH TO CYBERSECURITY 14
investigators and shift the blame to another source in addition to concealing the source of the
assaults.
Star Wars-themed Twitter Botnet: Two security researchers identified a Star Wars-themed
Twitter botnet made up of 350,000 bot accounts that tweet random phrases from the film
franchise. The emergence of a huge botnet like this one may have unintended and perhaps
serious consequences. Bots may, for example, distribute unsolicited spam, generate bogus hot
topics to affect public opinion, and execute specific cyberattacks (Penta Security Systems Inc.,
2017).
The Hajime Malware Botnet: Named after the Japanese term for "beginning," originally
surfaced in October of 2016last year and had gathered 300,000 devices as of April 2017.
Ironically, it is preventing new malware from infecting these hacked IoT devices.
WireX Android Botnet: Malicious applications have been on the rise this year. Google's Play
Store, in particular, has experienced an increase in rogue apps and bots masquerading as legal
apps.
The Reaper IoT Botnet: Known to "quietly" target security flaws in wireless IP-based devices
and other IoT devices by running a list of known usernames and passwords against the device,
the Reaper was found in September 2017. Once infected, a device may propagate malware to
Satori IoT Botnet: At least 280,000 IP addresses have been detected as being linked to this
botnet by security experts. Satori looks to be a variation of the Mirai botnet, which has
Kraken Botnet: The Kraken Botnet was believed to have infected 10% of all Fortune 500
organizations and to have control over approximately 500,000 bots. Each one was found to be
capable of sending up to 600,000 emails every day, totaling 300 million emails worldwide
(Thomas, 2015).
A creative new point of view from talented hackers is one factor that may lead a botnet's
characteristics to alter during the next 10 years. Another element that will cause change is the
availability of software environments that enable for simple control of Botnets. Finally, quicker
and more efficient hardware technology means less labor for a programmer or hacker to create
As the threat of Botnets has grown in tandem with the expanding usage and availability
of networked computers, the global community may do a number of things to mitigate future
risks. Current and worldwide cybersecurity policy must address a variety of issues. They include
improving the security of all IoT devices; requiring or encouraging international efforts to
communication between government departments and private industry; and providing monetary
incentives to emerging economies as they boost the presence of networked devices to adhere to
development is one of the key findings from the life cycle of software development. This should
become a standard not only for the SDLC, but also for the creation and maintenance of
for all countries as they strive to secure not just their government systems, but also the personal
GLOBAL APPROACH TO CYBERSECURITY 16
information of their inhabitants. Promoting better interaction on how to combat current and
upcoming attacks, as well as promoting the sharing of data on emerging risks, might improve
overall cybersecurity. Finally, more developed countries may create an international fund to
assist emerging economies in focusing on training and education as they progressively use
networked gadgets.
I believe that cybersecurity rules can be made successful enough to eliminate botnets in
two ways. First, states must be able to assign Botnet ownership to the persons and groups
responsible for its construction and usage. Second, international communities must reach an
agreement to allow such persons to be prosecuted through improved collaboration and other
References
Paganini, P. (2014). Massive Boleto fraud in Brazil caused 3,75 USD billion losses. Retrieved
from https://securityaffairs.co/wordpress/26359/cybercrime/massive-boleto-fraud-
brazil.html.
Brown, D. (2021). Cybercrime is dangerous, but a new UN treaty could be worse for rights.
new-un-treaty-could-be-worse-rights
Jakub, P. (2022). Russia's war on Ukraine: Timeline of cyber-attacks. Think Tank. Retrieved
Muggah, R., Thompson, N. (2018). Brazil struggles with effective cyber-crime response.
response/.
Penta Security Systems Inc. (2017). Top 5 Botnets of 2017. Retrieved from
https://www.pentasecurity.com/blog/top-5-botnets-2017/
https://security.radware.com/ddos-knowledge-center/ddospedia/botmaster/.
Rouse, M., & Haughn, M. (n.d.). What is command-and-control server (C&C server)? Definition
control-server-CC-server
https://techinbrazil.com/largest-cybercrime-threats-in-brazil.
GLOBAL APPROACH TO CYBERSECURITY 18
Thomas, K. (2015). Nine bad botnets and the damage they did. Retrieved from
https://www.welivesecurity.com/2015/02/25/nine-bad-botnets-damage/
is-a-botnet.html.