Thomas Wilson
When it comes to the security of information for individuals and businesses, it is crucial that the correct precautions and actions are taken. If businesses insider information were hacked or leaked to a hacker, they could sell that information to a competitor or use the information to destroy important processes or data. When focusing on an individual, healthcare records are protected and classified records and should not be hacked. Similar to these scenarios, I intend to share how attacks can be done on ping commands, phishing, and computer viruses.
Ping or tracert commands can be used to do something known as ping sweeping. This is when an attacker may use pings to scan a network and identify an active host to target for an attack. While these actions are not attacks themselves, they are used to gather information to conduct an attack. There is also an action known as ping flooding where the attacker sends a massive amount of ping requests to a target, and it crashes from being exhausted.
Another way attackers seek to gain access to one's information is through phishing. Phishing is when the attacker sends a message or email acting like they are from a normal and reputable company trying to trick the user into sharing personal information. This information can range from banking information to usernames or passwords. This is why IT security for individuals and companies is so important. According to Wright, R. et. al., (2023) empirical phishing research has emphasized the importance of broadly applicable IT security knowledge as key to avoid phishing attempts.
Computer viruses are the other most common way that attacker's access or hack the user's information. Viruses can be spread through email attachments or malicious websites, but it is usually because the user accesses it by accident or if they are tricked into it. That is why antivirus software, like symantec endpoint protection, is so important for businesses and individuals to install on their computers or systems. According to Tavori, J. & Levy, H. (2023) deployment of anti-virus software is a common strategy for preventing and controlling the propagation of computer viruses and worms over a computer network. Once the attacker deploys a virus on the user's computer or network, they deploy ransomware that can steal or delete data and information.
With the correct security steps deployed from IT, these attacks can be stopped and prevented. Individuals' computers at home usually come with some sort of antivirus software pre-installed. They can also install a fairly cheap system like Norton or Symantec endpoint protection to ensure the safety of their information. Another type of security is being cautious and applying the correct training to know how to spot attackers and not searching random websites or opening random emails from unknown users. With these steps and software individuals and businesses can eliminate and prevent attacks from ping commands, phishing, and computer viruses.
References
Tavori, J., & Levy, H. (2023). Resilience of Networks to Spreading Computer Viruses: Optimal Anti-Virus Deployment. NOMS 2023-2023 IEEE/IFIP Network Operations and Management Symposium, Network Operations and Management Symposium, NOMS 2023- 2023 IEEE/IFIP, 1–5. https://doi.org/10.1109/NOMS56928.2023.10154217 Wright, R. T., Johnson, S. L., & Kitchens, B. (2023). Phishing Susceptibility in Context: A Multilevel Information Processing Perspective on Deception Detection. MIS Quarterly, 47(2), 803–832. https://doi.org/10.25300/MISQ/2022/16625
Comments
Post a Comment