After reading chapter 1, evaluate the threats of a botnet attack.