Skip to main content

Network Security

 Thomas Wilson

When it comes to the security of information for individuals and businesses, it is crucial that the correct precautions and actions are taken. If businesses insider information were hacked or leaked to a hacker, they could sell that information to a competitor or use the information to destroy important processes or data. When focusing on an individual, healthcare records are protected and classified records and should not be hacked. Similar to these scenarios, I intend to share how attacks can be done on ping commands, phishing, and computer viruses. 

 Ping or tracert commands can be used to do something known as ping sweeping. This is when an attacker may use pings to scan a network and identify an active host to target for an attack. While these actions are not attacks themselves, they are used to gather information to conduct an attack. There is also an action known as ping flooding where the attacker sends a massive amount of ping requests to a target, and it crashes from being exhausted. 

 Another way attackers seek to gain access to one's information is through phishing. Phishing is when the attacker sends a message or email acting like they are from a normal and reputable company trying to trick the user into sharing personal information. This information can range from banking information to usernames or passwords. This is why IT security for individuals and companies is so important. According to Wright, R. et. al., (2023) empirical phishing research has emphasized the importance of broadly applicable IT security knowledge as key to avoid phishing attempts. 

 Computer viruses are the other most common way that attacker's access or hack the user's information. Viruses can be spread through email attachments or malicious websites, but it is usually because the user accesses it by accident or if they are tricked into it. That is why antivirus software, like symantec endpoint protection, is so important for businesses and individuals to install on their computers or systems. According to Tavori, J. & Levy, H. (2023) deployment of anti-virus software is a common strategy for preventing and controlling the propagation of computer viruses and worms over a computer network. Once the attacker deploys a virus on the user's computer or network, they deploy ransomware that can steal or delete data and information. 

With the correct security steps deployed from IT, these attacks can be stopped and prevented. Individuals' computers at home usually come with some sort of antivirus software pre-installed. They can also install a fairly cheap system like Norton or Symantec endpoint protection to ensure the safety of their information. Another type of security is being cautious and applying the correct training to know how to spot attackers and not searching random websites or opening random emails from unknown users. With these steps and software individuals and businesses can eliminate and prevent attacks from ping commands, phishing, and computer viruses. 

References 

 Tavori, J., & Levy, H. (2023). Resilience of Networks to Spreading Computer Viruses: Optimal Anti-Virus Deployment. NOMS 2023-2023 IEEE/IFIP Network Operations and Management Symposium, Network Operations and Management Symposium, NOMS 2023- 2023 IEEE/IFIP, 1–5. https://doi.org/10.1109/NOMS56928.2023.10154217 Wright, R. T., Johnson, S. L., & Kitchens, B. (2023). Phishing Susceptibility in Context: A Multilevel Information Processing Perspective on Deception Detection. MIS Quarterly, 47(2), 803–832. https://doi.org/10.25300/MISQ/2022/16625

Comments

Popular posts from this blog

Travelling Through a Network

  Thomas Wilson Packets move through networks from one computer to another. These tools are extremely useful when troubleshooting network configurations and if a network is talking or not. They move from devices like switches and routers until they reach the final destination. Packets usually move in specific order to their final destination. A ping and tracert command are different because the ping verifies that a host is reachable or not and the tracert command shows the detail of each stop at the routers and the time it takes to reach each router. When pinging each site, I noticed that the other countries website TTL is greater than google. This makes sense because the TTL is the determined "hop" time between servers before being dropped. When performing a tracert command, it shows each stop to the host's IP and the time it takes to get between each. Each tracert command gets longer in time to each host as it goes down the list. I noticed that google had 16 total stops...

OS theory Final- CPT.304 TPW

  An (OS) operating system is a powerful program that manages all of the software and hardware on a computer. There are often many computer programs running at the same time, some visual and some in the background, and they must access the CPU, memory, and storage to function correctly. There are several types of operating systems, but they all share a similar goal in efficiently and successfully operating the computer system. The major functions of the operating system include process management, device management, file management, communication and networking, security, and resource allocation. Some of the features that work with these functions are multitasking, multithreading, virtual memory, graphical user interface, IO devices, and computing.  When these functions and features of the OS are collaborating and working seamlessly together, it creates a magnificent operating system and allows the user to have a successful experience with the computer.   Operating...

Review Of Mobile/Web Application

Thomas Wilson Review of Boat Trader:   I have bought and sold multiple boats in my life using boat trader. The boat trader application is an excellent tool to filter and find distinctive style boats in a certain area. These boats can be offered by a dealership or a private seller. The biggest benefit of using boat trader is selecting a specific state or mileage away from a specific location that one is looking to purchase or sell from. There are many excellent features when it comes to this application but there are a couple of recommendations, I could give that I personally think would make it easier and more user friendly.    Usability:   The usability of the boat trader application is excellent overall. The initial home page of the site allows the user to select a drop down to either find, sell, or select services and research boats. If the user selects to "find" boats for sale, then it is directed to the next page where there are numerous filters that can be sele...