Nt1330 Unit 3 Assignment 3 Scenario Analysis

Words: 999
Pages: 4

Scenario 2: The above shown Figure 2 describes this real-life scenario in a nutshell. Imagine a state wherein the device owner does not take notice of the notification from the proposed model and a device reboot happens whilst the model is executing its security tasks. In spite of this, this model with all its advanced functionalities is able to secure the device via persistent installation and changing the credentials. We already know from our first scenario that the model scans for IOT vulnerable devices and then infects and sanitizes them, and later notifies the owner. Though, in such a scenario the device owner unfortunately choses to ignore the threat or ends up not noticing the notification and therefore does not perform any action. …show more content…
It is an open source botnet which aims to secure IoT devices from other malicious botnets. It functions in the same manner as that of a computer security system. The devices are updated using its peer to peer networking and then deletes the remaining malware bots. Linux.Wifatch was one of the first vigilante botnets to be used. It logs into the devices using weak telnet credentials and then removes the other malicious botnets and disables the access to telnet. It then shows the message "Telnet has been closed to avoid further infection of this device. Please disable telnet, change telnet passwords, and/or update the firmware."

Hajime is a vigilante bot launched in October 2016 which served the same purpose as Linux.Wifatch to secure the IoT devices against the malware botnets. It is considered to be more advanced than the malicious Mirai botnet. It does not contain any modules for DDoS attacks and only focuses on extending its reach in other to kill the malicious botnets. It uses peer to peer networking. After doing its work, it leaves the message “Just a white hat, securing some systems. Important message will be signed like this!”. It is more efficient than the previous two botnets