-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathIR-T7.IR-T7-r1.annotated_sentences.json
1 lines (1 loc) · 13.8 KB
/
IR-T7.IR-T7-r1.annotated_sentences.json
1
{"taskStmt":"Find information about botnet attacks and their impacts ","request":{"reqNum":"IR-T7-r1","reqText":"Find details about the Mirai botnet and its large DDOS attack","exampleDocs":[{"docNumber":1,"docId":"a9e775d8-a2cd-45da-83d6-45a64e0b825b","sentences":[{"sentence":"ANCHORAGE, Alaska (AP) \u2014 Three young computer hackers whose \"botnet\" known as Mirai virtually paralyzed chunks of the internet two years ago have received light sentences after helping the FBI with cybercrime and cybersecurity.","judgment":"P","sentenceId":"IR-T7-r1-rd1-s1"},{"sentence":"Paras Jha, 22, of Fanwood, New Jersey; Josiah White, 21, of Washington, Pennsylvania; and Dalton Norman, 22, of Metairie, Louisiana, were sentenced Tuesday to five years of probation and 62½ workweeks of community service in U.S. District Court in Anchorage.","judgment":"P","sentenceId":"IR-T7-r1-rd1-s2"},{"sentence":"The three men, who pleaded guilty to computer fraud charges in December, also were ordered to pay $127,000 in restitution and gave up what authorities said was a significant amount of cryptocurrency.","judgment":"P","sentenceId":"IR-T7-r1-rd1-s3"},{"sentence":"Chief U.S. District Judge Timothy Burgess handed down the sentences after the men cooperated extensively with the FBI on cybercrime investigations and broader defensive efforts, according to a statement from the U.S. attorney's office in Alaska.","judgment":"G","sentenceId":"IR-T7-r1-rd1-s4"},{"sentence":"Terms of their sentences include the expectation they will keep helping the FBI.","judgment":"F","sentenceId":"IR-T7-r1-rd1-s5"},{"sentence":"Advertisement","judgment":"B","sentenceId":"IR-T7-r1-rd1-s6"},{"sentence":"\"Cybercrime is a worldwide epidemic that reaches many Alaskans,\" Bryan Schroder, the U.S. attorney for Alaska, said in the release.","judgment":"G","sentenceId":"IR-T7-r1-rd1-s7"},{"sentence":"\"The perpetrators count on being technologically one step ahead of law enforcement officials.","judgment":"G","sentenceId":"IR-T7-r1-rd1-s8"},{"sentence":"\"The plea agreement with the young offenders in this case was a unique opportunity for law enforcement officers and will give FBI investigators the knowledge and tools they need to stay ahead of cybercriminals around the world,\" he said.","judgment":"G","sentenceId":"IR-T7-r1-rd1-s9"},{"sentence":"The men created a collection of hundreds of thousands of computers and internet-connected devices \u2014 including routers, webcams and other devices \u2014 infected with malware that they controlled, according to court documents.","judgment":"E","sentenceId":"IR-T7-r1-rd1-s10"},{"sentence":"A broad \"denial of service\" attack waged using the Mirai botnet knocked platforms such as Twitter and Netflix offline in October 2016.","judgment":"P","sentenceId":"IR-T7-r1-rd1-s11"},{"sentence":"Prosecutors said they don't believe the three men were responsible for that attack because Jha had already posted the code for Mirai to online criminal forums.","judgment":"G","sentenceId":"IR-T7-r1-rd1-s12"},{"sentence":"Jha and Norman also pleaded guilty to a separate conspiracy charge for using another powerful botnet for a \"clickfraud\" scheme, used to artificially generate advertising revenue by making it appear that a real user clicked on an online ad.","judgment":"G","sentenceId":"IR-T7-r1-rd1-s13"},{"sentence":"The investigation originated in Anchorage after some internet-connected devices in Alaska were affected by the Mirai malware.","judgment":"P","sentenceId":"IR-T7-r1-rd1-s14"},{"sentence":"Bill Walton, a special agent who oversees the Anchorage FBI's Cyber Crime unit, said in December that the botnet's name is a reference to a Japanese anime called Mirai Nikki, which loosely translated into English means \"future diary.\"","judgment":"P","sentenceId":"IR-T7-r1-rd1-s15"},{"sentence":"Walton said the three men were fans of that anime.","judgment":"G","sentenceId":"IR-T7-r1-rd1-s16"}]},{"docNumber":2,"docId":"6a5f4ef4-3f15-4d9c-8354-0f930c509572","sentences":[{"sentence":"GM of Primekey, a Swedish EJBCA PKI company with offices in Stockholm, San Mateo, Aachen and Melbourne.","judgment":"F","sentenceId":"IR-T7-r1-rd2-s1"},{"sentence":"getty","judgment":"B","sentenceId":"IR-T7-r1-rd2-s2"},{"sentence":"Winston Churchill famously said that \u201Cthose that fail to learn from history are condemned to repeat it.\u201D","judgment":"B","sentenceId":"IR-T7-r1-rd2-s3"},{"sentence":"Ransomware has captured the attention of hackers and security professionals alike, with major attacks against critical infrastructure sectors resulting in major payouts to these criminal groups.","judgment":"E","sentenceId":"IR-T7-r1-rd2-s4"},{"sentence":"Cybersecurity has often been compared to a game of cat and mouse.","judgment":"E","sentenceId":"IR-T7-r1-rd2-s5"},{"sentence":"As security professionals \u201Cmove the cheese\u201D to make ransomware less successful and profitable, malicious actors must change their tactics.","judgment":"G","sentenceId":"IR-T7-r1-rd2-s6"},{"sentence":"However, this sort of protection is predicated on organizations responding after bad actors have already attacked.","judgment":"G","sentenceId":"IR-T7-r1-rd2-s7"},{"sentence":"How can organizations better prepare for the future?","judgment":"B","sentenceId":"IR-T7-r1-rd2-s8"},{"sentence":"Churchill would say they must learn from the past.","judgment":"B","sentenceId":"IR-T7-r1-rd2-s9"},{"sentence":"Learning From The Pastrior to the recent outbreak of ransomware, the Mirai botnet was one of the most high-profile attacks in the past decade.","judgment":"P","sentenceId":"IR-T7-r1-rd2-s10"},{"sentence":"Mirai leveraged compromised IoT devices to launch the largest DDoS attacks in history.","judgment":"P","sentenceId":"IR-T7-r1-rd2-s11"},{"sentence":"These devices were compromised because they had poor security.","judgment":"P","sentenceId":"IR-T7-r1-rd2-s12"},{"sentence":"The Mirai botnet may seem like recent history, but a lot can change in five years.","judgment":"P","sentenceId":"IR-T7-r1-rd2-s13"},{"sentence":"Case in point, it\u2019s estimated that there will be more than 75 billion IoT-connected devices by 2025 \u2014 a nearly 300% increase since 2019.","judgment":"E","sentenceId":"IR-T7-r1-rd2-s14"},{"sentence":"In addition to the exponential growth of IoT devices, many of these devices are completely wireless and devoid of any management interface \u2014 a so-called \u201Cheadless device.\u201D","judgment":"E","sentenceId":"IR-T7-r1-rd2-s15"},{"sentence":"Challenges Of The PresentEach new IoT device is a new target for attack.","judgment":"E","sentenceId":"IR-T7-r1-rd2-s16"},{"sentence":"It\u2019s become a challenge to protect these devices at the same pace as their explosive growth.","judgment":"G","sentenceId":"IR-T7-r1-rd2-s17"},{"sentence":"Here are a few real-world use cases that illustrate the rapid adoption of certain connected devices and the specific challenges they face:","judgment":"G","sentenceId":"IR-T7-r1-rd2-s18"},{"sentence":"\u2022 Internet-connected cars: Today, it\u2019s estimated that \u201Cone in five vehicles on the road worldwide will have some form of wireless network connection.\u201D","judgment":"F","sentenceId":"IR-T7-r1-rd2-s19"},{"sentence":"Security researchers have already demonstrated the real-world risk of hacking internet-connected vehicles \u2014 a risk that seems even more serious with the emergence of autonomous vehicles.","judgment":"F","sentenceId":"IR-T7-r1-rd2-s20"},{"sentence":"It\u2019s become critical that auto manufacturers can validate these internet-connected systems as they come off the manufacturing line to make sure they haven\u2019t been altered, as well as establish secure data tunnels for over-the-air updates and data sharing.","judgment":"F","sentenceId":"IR-T7-r1-rd2-s21"},{"sentence":"As the sales of electric vehicles surge, it\u2019s imperative that security scales with it.","judgment":"F","sentenceId":"IR-T7-r1-rd2-s22"},{"sentence":"\u2022 Wearable medical devices: The market for wearable and connected medical devices is booming and expected to continue at a 26.8% compound annual growth rate until 2028.","judgment":"F","sentenceId":"IR-T7-r1-rd2-s23"},{"sentence":"Security researchers have also demonstrated the real-world risk of hacking connected medical devices.","judgment":"F","sentenceId":"IR-T7-r1-rd2-s24"},{"sentence":"Consequently, medical device manufacturers should be equally concerned with validating their devices as they come off the manufacturing line.","judgment":"F","sentenceId":"IR-T7-r1-rd2-s25"},{"sentence":"Additionally, a specific challenge for certain wearable medical devices is that they need to be replaced frequently (as often as every two weeks), which requires security to scale with this ebb and flow.","judgment":"F","sentenceId":"IR-T7-r1-rd2-s26"},{"sentence":"\u2022 Retail and hospitality devices: The rise of connected devices at retail and hospitality establishments can be witnessed with a quick trip to the mall or at any number of hotels or restaurant chains you might visit during a family vacation.","judgment":"F","sentenceId":"IR-T7-r1-rd2-s27"},{"sentence":"These include handheld devices that retail employees use to track inventory and facilitate sales transactions, or tablets that enable customers to access and purchase additional amenities.","judgment":"F","sentenceId":"IR-T7-r1-rd2-s28"},{"sentence":"A particular challenge for the retail industry is scaling for seasonal shoppers and employees.","judgment":"F","sentenceId":"IR-T7-r1-rd2-s29"},{"sentence":"Securing The Future: Identity Is KeyHistorically, the legacy security model was focused on protecting users, their devices and their emails.","judgment":"F","sentenceId":"IR-T7-r1-rd2-s30"},{"sentence":"However, the rise of cloud computing has resulted in the ongoing transition to zero trust security.","judgment":"F","sentenceId":"IR-T7-r1-rd2-s31"},{"sentence":"Zero trust security requires its users to validate their identities before accessing corporate resources, such as through an identity and access management solution.","judgment":"F","sentenceId":"IR-T7-r1-rd2-s32"},{"sentence":"However, IoT devices have blurred the lines between users and devices with the concept of a \u201Cmachine identity.\u201D","judgment":"F","sentenceId":"IR-T7-r1-rd2-s33"},{"sentence":"Zero trust security also dictates that this machine identity must be authenticated.","judgment":"F","sentenceId":"IR-T7-r1-rd2-s34"},{"sentence":"A user name and password are the most common approach to authentication, but this can be time-consuming and difficult to manage on IoT devices (especially headless devices).","judgment":"F","sentenceId":"IR-T7-r1-rd2-s35"},{"sentence":"IoT device management solutions coupled with identity and access management (IAM) are another option.","judgment":"F","sentenceId":"IR-T7-r1-rd2-s36"},{"sentence":"Public key infrastructure (PKI) solutions can also authenticate devices through the use of trusted certificates.","judgment":"F","sentenceId":"IR-T7-r1-rd2-s37"},{"sentence":"Agile solutions become even more important on wireless and headless devices because they lack many native network protections.","judgment":"F","sentenceId":"IR-T7-r1-rd2-s38"},{"sentence":"When a wireless device enters an untrusted environment, it still needs to remain protected and to operate as expected.","judgment":"F","sentenceId":"IR-T7-r1-rd2-s39"},{"sentence":"However, over-the-air updates and authentication can become complex for organizations spread across the globe because of latency and connectivity issues.","judgment":"F","sentenceId":"IR-T7-r1-rd2-s40"},{"sentence":"Cloud-based authentication solutions deliver the security benefits of traditional authentication processes with the management flexibility of a cloud service, making them ideal for wireless and headless IoT devices.","judgment":"F","sentenceId":"IR-T7-r1-rd2-s41"},{"sentence":"IoT Security Is A Shared ResponsibilityThe threat landscape is constantly evolving, but the one thing that remains the same is that attackers will always look for the weakest link.","judgment":"F","sentenceId":"IR-T7-r1-rd2-s42"},{"sentence":"And even though a lot can change in five years, just as much can stay the same, such as the inertia to protect these devices.","judgment":"F","sentenceId":"IR-T7-r1-rd2-s43"},{"sentence":"As organizations respond to the increase in ransomware, wireless IoT devices may soon emerge as the next target because they are more difficult to protect.","judgment":"F","sentenceId":"IR-T7-r1-rd2-s44"},{"sentence":"If the attack on Colonial Pipeline has demonstrated the impact of ransomware on critical infrastructure, then imagine what could happen if ransomware compromised a connected car or medical device.","judgment":"F","sentenceId":"IR-T7-r1-rd2-s45"},{"sentence":"Ultimately, IoT security is a shared responsibility.","judgment":"B","sentenceId":"IR-T7-r1-rd2-s46"},{"sentence":"Authentication can help.","judgment":"B","sentenceId":"IR-T7-r1-rd2-s47"},{"sentence":"Manufacturers need certificates to validate their devices as they come off the line.","judgment":"B","sentenceId":"IR-T7-r1-rd2-s48"},{"sentence":"Organizations need certificates to authenticate the machine identity of their IoT devices.","judgment":"B","sentenceId":"IR-T7-r1-rd2-s49"},{"sentence":"And both manufacturers and organizations can benefit from the flexible security of cloud-based authentication, enabling them to stay a step ahead of the next attack.","judgment":"B","sentenceId":"IR-T7-r1-rd2-s50"},{"sentence":"Forbes Technology Council is an invitation-only community for world-class CIOs, CTOs and technology executives.","judgment":"B","sentenceId":"IR-T7-r1-rd2-s51"},{"sentence":"Do I qualify?","judgment":"B","sentenceId":"IR-T7-r1-rd2-s52"}]}]},"taskNarr":"A botnet is a large set of computers infected with a specific piece of malware that lets them be controlled centrally Botnets can be used to launch distributed denial of service attacks, perform distributed computations like bitcoin mining, or other things ","taskTitle":"7 Botnets","taskNum":"IR-T7"}