From f588183c8c02c2aee5f7febc281ec20077aaa28e Mon Sep 17 00:00:00 2001 From: Bob Mottram Date: Sun, 12 Feb 2017 10:06:54 +0000 Subject: [PATCH] Formatting --- entries/botmaster.txt | 8 +++++++- entries/botnet.txt | 8 +++++++- entries/iot.txt | 12 +++++++++++- 3 files changed, 25 insertions(+), 3 deletions(-) diff --git a/entries/botmaster.txt b/entries/botmaster.txt index cad5a0c..130c124 100644 --- a/entries/botmaster.txt +++ b/entries/botmaster.txt @@ -1,3 +1,9 @@ botmaster -Someone who remotely controls one or more botnets (a set of exploited computer systems) via the internet, typically via a simple interface such as IRC chat. They may then rent out the ability to conduct various nefarious activities, such as DDoS attacks, on the black market. Botmasters can also be government agencies conducting various kinds of cyberwarfare or astroturfing propaganda campaigns in a thin attempt to legitimize their authority and influence the popular psyche. \ No newline at end of file +Someone who remotely controls one or more botnets (a set of exploited +computer systems) via the internet, typically via a simple interface +such as IRC chat. They may then rent out the ability to conduct various +nefarious activities, such as DDoS attacks, on the black market. +Botmasters can also be government agencies conducting various kinds of +cyberwarfare or astroturfing propaganda campaigns in a thin attempt to +legitimize their authority and influence the popular psyche. \ No newline at end of file diff --git a/entries/botnet.txt b/entries/botnet.txt index 4676766..09941c3 100644 --- a/entries/botnet.txt +++ b/entries/botnet.txt @@ -1,3 +1,9 @@ botnet -A network of internet connected systems which have been taken over using security exploits or laughably dreadful password policies. Often older systems which have not received security updates or which are no longer supported by the OEM become easy recruits to one or more botnet. Hackers or government agencies who have remote control over the exploited machines are known as botmasters. Botnets may be used to carry out DDoS attacks or a motley assortment of nefarious activities. \ No newline at end of file +A network of internet connected systems which have been taken over using +security exploits or laughably dreadful password policies. Often older +systems which have not received security updates or which are no longer +supported by the OEM become easy recruits to one or more botnet. Hackers +or government agencies who have remote control over the exploited machines +are known as botmasters. Botnets may be used to carry out DDoS attacks +or a motley assortment of nefarious activities. \ No newline at end of file diff --git a/entries/iot.txt b/entries/iot.txt index ba7e502..2eb7159 100644 --- a/entries/iot.txt +++ b/entries/iot.txt @@ -1,3 +1,13 @@ internet of things (IoT) -The internet of things refers to an insecure global network of devices connected to the internet. After three decades the familiar personal computing market had been thoroughly saturated but the internet continued to expand beyond its early scope into embedded systems typically having a single dedicated purpose, such as electricity meters, thermostats, television set-top boxes and childrens toys. The ultra low cost of many of these gadgets together with the lack of any incentive to supply them with after-market security updates meant that large parts of the IoT rapidly turned into a chaotic swamp of botnets periodically pushing out DDoS attacks against flavor-of-the-week adversaries as botmasters jockeyed for control of the networks. \ No newline at end of file +The internet of things refers to an insecure global network of devices +connected to the internet. After three decades the familiar personal +computing market had been thoroughly saturated but the internet continued +to expand beyond its early scope into embedded systems typically having +a single dedicated purpose, such as electricity meters, thermostats, +television set-top boxes and childrens toys. The ultra low cost of many +of these gadgets together with the lack of any incentive to supply them +with after-market security updates meant that large parts of the IoT +rapidly turned into a chaotic swamp of botnets periodically pushing out +DDoS attacks against flavor-of-the-week adversaries as botmasters +jockeyed for control of the networks. \ No newline at end of file