Intelligent CIO Middle East Issue 36 | Page 96

t cht lk “ ONCE AN ATTACK HAS GOT UNDERWAY, IT CAN BE DIFFICULT TO DETECT. 96 INTELLIGENTCIO This large distributed, network of computers, under the control of threat actors, represents an aggregation of computing power that can be used for a devastating effect. Inside the network Malicious software designed to exploit IoT devices is usually not sophisticated. It operates by scanning network ports, looking for access opportunities, and gaining access through default credentials, or brute-force hacking to gain access. This software is much easier to defend against, as it merely requires configuring the network firewall protection devices. Like other malware, botnets can enter an organisation through multiple points of entry. This includes email attachments, hacked web sites, connected sensors and other IoT devices, and USB sticks. Once malicious software has entered an organisation, it will call home – the hackers command and control server – to register www.intelligentcio.com