Home / Blogs

Reducing the Risks of BYOD with DNS-Based Security Intelligence; Part 1: Understanding the Risks

Pat Barnes

Ah, BYOD. How I love thee.

BYOD, or "Bring Your Own Device", gives me choices. I can use a device at work I actually like and am most effective with. (How did I ever get by without my iPad?)

But BYOD comes with challenges. Personal devices can be infected with malware. Once they're connected to an enterprise's network, they can be controlled by a bot master to hijack enterprise resources and wreak havoc as part of a botnet. The biggest risk is data exfiltration which can have serious consequences: loss of valuable intellectual property, unauthorized disclosure of personal and confidential information, and more.

Having mentioned bot masters and botnets, here's a primer on what these terms are. Many cyber criminals employ bot networks, commonly known as "botnets", as the instrument of choice to implement their malicious activities. Bots are simply software that runs autonomously over the Internet. Devices can be infected with malware that operates as a "bot", autonomously exploiting the network to conduct malicious activities. A botnet is a collection of bots in the control of a cyber criminal (the "bot master"). Botnets are used by cyber criminals for a variety of malicious purposes. For example, they might rent their botnet to perform distributed denial of service (DDoS) attacks against websites or they're tasked with penetrating enterprise defenses and looking for valuable data. Bot masters control botnets by providing them with instructions that dictate the malicious activities the bot undertakes. Bots receive instructions by communicating with a server controlled by the bot master, known as command and control (C&C).

What can an enterprise do? Should BYOD be banned? Not without revolt, likely. In part two I'll discuss a DNS-based approach you can use to reduce the risks of allowing BYOD on your network.

By Pat Barnes, Product Manager of Security Solutions at Nominum

Related topics: DNS, Security

WEEKLY WRAP — Get CircleID's Weekly Summary Report by Email:


Way too short - you might put a bit more than just the teaser paragraphs in, next time. Suresh Ramasubramanian  –  Jan 22, 2013 7:14 PM PST

That said, yes, DNS jails, device firewall policies etc (and metrics from those) are absolutely necessary for byod deployment.

To post comments, please login or create an account.

Related Blogs

Related News


Industry Updates – Sponsored Posts

Computerworld Names Afilias' Ram Mohan a Premier 100 Technology Leader

Verisign Mitigates More Attack Activity in Q3 2015 Than Any Other Quarter During Last Two Years

Protect Your Privacy - Opt Out of Public DNS Data Collection

Verisign & Forrester Webinar: Defending Against Cyber Threats in Complex Hybrid-Cloud Environments

Measuring DNS Performance for the User Experience

Introducing Verisign Public DNS: A Free Recursive DNS Service That Respects Your Privacy

Faster DDoS Mitigation - Introducing Verisign OpenHybrid Customer Activated Mitigation

Internet Grows to 296 Million Domain Names in Q2 2015

Verisign's Q2'15 DDoS Trends: DDoS for Bitcoin Increasingly Targets Financial Industry

Protect Your Network From BYOD Malware Threats With The Verisign DNS Firewall

Announcing Verisign IntelGraph: Unprecedented Context for Cybersecurity Intelligence

Introducing the Verisign DNS Firewall

TLD Security, Spec 11 and Business Implications

Verisign Named to the Online Trust Alliance's 2015 Honor Roll

3 Key Steps for SMBs to Protect Their Website and Critical Internet Services

Key Considerations for Selecting a Managed DNS Provider

Verisign Mitigates More DDoS Attacks in Q1 2015 than Any Quarter in 2014

Verisign OpenHybrid for Corero and Amazon Web Services Now Available

Afilias Supports the CrypTech Project - Ambitious Hardware Encryption Effort to Protect User Privacy

Public Sector Experiences Largest Increase in DDoS Attacks (Verisign's Q4 2014 DDoS Trends)

Sponsored Topics