Network Security
This week's four assignments
will cover information and systems security, which is paramount at both
individual and organizational levels. In the individual segment, securing
sensitive Information like financial records, social security numbers, and
personal communications is critical considering the threats of identity theft,
monetary loss, and privacy infractions. For the organizational segment,
sensitive data, intellectual property, and customer information are vital to
organizational success, and protecting them is critical to maintaining trust
between customers and organizations, remaining compliant with regulations, and
avoiding both financial and reputational damage. Additionally, security
breaches can result in monetary losses and legal liabilities and compromise an organization's
reputation.
Ping
Commands
Ping commands can be done
inter-device, and, on a network, which is common, to ping instead for something
malicious. An example of an attack is the Ping Flood Attack, a form of
Denial-of-Service (DoS) attack. For this example, in this attack, an attacker
sends numerous ICMP (Internet Control Message Protocol) echo requests to a
target system. This can drain the target's bandwidth and resources so much that
it can't handle real traffic.
Vulnerabilities
There are many reasons why
computer systems have vulnerabilities. Security holes, or vulnerabilities, are
the gaps in software, hardware, or network setups that an attacker can target.
These vulnerabilities can result from coding mistakes, failure to update, or
misconfigurations outdated software or default Passwords. Furthermore, phishing attacks target
humans, not technology. Phishing attackers use emails, messages, or websites
that appear legitimate to deceive individuals into providing sensitive information
such as passwords, credit card numbers, or login credentials. Users are
susceptible, as they may lack the education or training to spot a phishing
attempt.
Symptoms
and Damage
Ultimately, there are symptoms
that indicate a potential cyber security breach on a computer or device.
As a result, these issues, such as system instability, data theft, corruption,
crashes, and potentially installing malware or backdoors to maintain access for
future attacks, stem from the attacks used by hackers.
Advisories
for Safeguarding
To protect against hackers,
Users should be regularly trained to identify and avoid social engineering
attacks. Additionally, installing email filtering and anti-phishing tools can
help email filtering solutions that identify and prevent phishing emails from
reaching users' inboxes. Next, updating the device or computer's antivirus
software helps protect against hackers who use malware and other malicious
programs
Conclusion
In today's world, Information and
system security are critical to protecting people and organizations from
numerous threats. As an open-use technology, awareness of the attack types
available including ping commands and security holes such as those exposed by
Phishing will help write protective procedures to secure applications and data.
Some key strategies to mitigate the risks are regularly updating the software
programs, user education, and utilizing security tools.
Reference
Stallings, W. (2017). Network
Security Essentials: Applications and Standards. Pearson.
Whitman, M. E., & Mattord,
H. J. (2018). Principles of Information Security. Cengage Learning.
CERT Coordination Center. (n.d.).
Understanding Denial-of-Service Attacks. Retrieved
from https://www.cert.org/
Svensberg, P. (2023).
Software-defined zero-trust network architecture: Evolution from Purdue model
-based networking. https://core.ac.uk/download/581147681.pdf
InsiderThreat|SoftwareEngineeringInstitute.(n.d.)Www.sei.cmu.edu.
https://www.sei.cmu.edu/our-work/insider-threat/index.cf
Instructor Feedback:
Comments
Post a Comment