Network
Security
As most of our communications and actions continue to
venture online, privacy and security is an important topic to regularly think
about. Keeping the information that one
puts in their personal network and outside of their personal network secure as
possible is good practice for users of today’s computers. This can be done by having knowledge of what
threats are out there and what others can do to get access to this
information. Organizations and
individuals need to be cautious of how vulnerable their information and system
can be to outside threats and protect them with their best foot forward.
We use computers for different activities in our
lives. In the first quarter of 2018, “U.S.
adults spent three hours and 48 minutes a day on computers, tablets and
smartphones” (Fottrell, 2018). Having a
stable knowledge of how to protect this time from security breaches is
important. A security breach is a case
of unauthorized computer access to a person’s private email or social media (Vahid
& Lysecky, 2017). We do things on
our computers in our free time and for work that we would like to be only seen
by authorized individuals. When a
company’s system is compromised for by a security breach it is possible for the
company to lose money in hidden cost such as loss of business, impact on
negative on reputation, and employee time spent in recovery. The financial damage caused by a data breach
now cost companies an average of $3.86 billion a year (Weisbaum, 2018).
Today there are many different types of attacks that can
be executed, and the use of the ping command is one of them. “The ping command is a Command Prompt command used
to test the ability of the source computer to reach a specified destination
computer” (Fisher, 2019). Using the ping
command many hackers like to execute the attack known as denial of
service. A distributed denial of service
(DDoS) attack is a malicious attempt to make an online service unavailable to
users, usually by temporarily interrupting or suspending the services of its hosting
server. Unlike other kinds of
cyberattacks, DDoS assaults don’t attempt to breach your security perimeter.
Rather, they aim to make your website and servers unavailable to legitimate
users. DDoS can also be used as a smokescreen for other malicious activities
and to take down security appliances, breaching the target’s security
perimeter.
The
Ping of death (PoD) attack is attack in which an attacker attempts to crash,
destabilize, or freeze the targeted computer or service by sending malformed or
oversized packets using a simple ping command.
While PoD attacks exploit legacy weaknesses, which may have been patched
in target systems. However, in an unpatched system, the attack is still
relevant and dangerous. Recently, a new type of PoD attack has become popular.
This attack, commonly known as a Ping flood, the targeted system is hit with
ICMP packets sent rapidly via ping without waiting for replies. To avoid Ping
of Death attacks, and its variants, many sites block ICMP ping messages
altogether at their firewalls. However, this approach is not viable in the long
term (n.d.).
Computer
systems are vulnerable to many different security threats. “On-line systems and telecommunications are especially vulnerable because data and files
can be immediately and directly accessed through computer terminals or at points in the telecommunications
network” (Laudon & Laudon, 2007).
Computers have security holes and vulnerably but human interaction
through social engineering and phishing has become popular. According to a 2018 study, 17 percent of
people fall victim to social
engineering attacks and 83 percent of all companies have reported that they
experienced phishing attacks (Lopez, 2019).
Social
engineering entails tricking people into giving their confidential information
or manipulating them to do something. There
are many types of social engineering attacks with email spam and phishing being
a couple examples. Phishing is typically
done when someone is manipulated to login to a site such as their banking
account. This is typically done by a
fake email sent to the victim asking them log into the fake online banking
account, the attacker then has access to the information needed to access the
real account. People are vulnerable to
phishing attacks because phishing emails and websites are well put together to
look identical to the real bank. When
the phishing attack is executed, the individual can see money come out of their
bank account unexpectedly. A way for
people to not be victims of phishing is by not opening links in emails and be
cautious of all communications received.
Social
engineering manipulation has been around for a long time, but it is still a way
an attacker uses to get important information.
Employees at a company can receive e-mails from attackers acting like a
potential customer or current employees.
The emails may come through an exact email of a supervisor asking for
the password to the system as if they forgot the password. The manipulation can give the attacker access
to all the important documents and information in the company’s computer
database. If an employee is asked for
important information such as a password, they should go directly to that
person to give the password. Businesses
should do continuous education of potential social engineering attacks. Spending a small amount of money for training
of potential attacks can go a long way in the long term.
There
are many ways for an attacker to access an individual or company’s private
information. As computer usage continues
to increase and new attacks continue to be made, being cautious is a good first
step to privacy protection. Unauthorized
access to private information can put stress on individuals mentally and
financially on companies.
No comments:
Post a Comment