Network Security

 

In an era where digital data is the backbone of our economy, personal lives, and societal functions, robust information and system security cannot be overstated. Imagine a world where your personal information, from your financial details to private communications, is open to any prying eyes. This scenario isn’t just a nightmare but a potential reality if cybersecurity measures fail. For individuals, a breach in security can mean identity theft, financial loss, or severe personal privacy violations. For organizations, the stakes are even higher as they face threats that could cripple their operations, tarnish their reputation, or shut down their services entirely.

Moreover, the simplicity of certain attacks, such as those executed using basic ping commands, highlights the ever-present need for vigilance. Ping commands, often perceived as harmless tools for checking network connections, can be weaponized to orchestrate ping flood attacks. While researching, I encountered several types of ping commands; Imperva.com goes into depth with these, for example, “A variation on the ping flood is the Ping of Death attack. In this type of assault, the attacker sends malformed or oversized ICMP packets that exceed the maximum IPv4 packet size of 65,535 bytes. This crashes or freezes the target system” assaults deluge a system with an overwhelming number of packets, bogging down processes and potentially leading to service disruptions. This type of attack exemplifies how everyday tools can turn into threats, underscoring the crucial role of cybersecurity in safeguarding our digital world.

 

 


 

 

Email Spam

Computer systems can be vulnerable to email spam and computer viruses due to various factors, such as weak security measures, user behavior, and the ever-evolving nature of cyber threats. “computer virus is a program that runs on a user's computer without permission, and spreads itself to other computers, often via email” (“TEC 101 Fundamentals of Information Technology and Literacy”) (Ch8.2).  Let's explore the symptoms and damage each breach inflicts and some recommendations for protecting systems from these security threats. Email spam is unsolicited, and unwanted emails are often sent in bulk. When a computer system is compromised by email spam, it can lead to several negative consequences. Symptoms may include an overwhelming influx of irrelevant or suspicious emails, increased network traffic, and decreased system performance. The damage caused by email spam includes wasted storage space, increased bandwidth usage, and the potential for phishing attacks or the delivery of malicious attachments. To protect computer systems from email spam, here are two recommendations. 1.) Use spam filters: Implement robust spam filtering software or services that can identify and block spam emails before they reach the user's inbox. This can significantly reduce the volume of spam and minimize the risk of falling victim to phishing attempts or malware. 2.) Be cautious with email addresses: Avoid sharing email addresses publicly or on untrusted websites to minimize the chances of receiving spam.

 

 

Computer Viruses

Computer viruses are malicious programs that can replicate and spread, causing harm to computer systems. While researching computer viruses, I came across a cool blog on system networks that goes into detail to see the signs of viruses on devices and that once a system is infected, the consequences can be severe. The blog describes the symptoms of a virus infection and explains it may include slow performance, unexpected system crashes, unauthorized access to files or data, and unusual network activity. The damage caused by computer viruses can range from data loss and corruption to the theft of sensitive information or the complete destruction of the system. Here are two recommendations to protect computer systems from viruses. 1.) Install reputable antivirus software: Utilize antivirus software from trusted vendors and keep it up to date. Regularly scan the system for viruses before they cause significant damage. 2.) Exercise safe browsing and downloading practices: Avoid visiting suspicious websites, clicking on unknown links, or downloading files from untrusted sources. Be cautious when opening email attachments, as they can be common vectors for virus infections. By practicing safe browsing habits, users can reduce the risk of inadvertently downloading and executing malicious programs.

 

  

References

 McKeever, G. (2023, December 20). What is a Ping Flood | ICMP Flood DDoS Attack | Imperva. Learning Center. https://www.imperva.com/learn/ddos/ping-icm-flopod/

What are Computer Viruses? | Definition & Types of Viruses. (n.d.). Fortinet. https://www.fortinet.com/resources/cyberglossary/computer-virus#:~:text=A%20computer%20virus%20is%20a%20type%20of%20malicious,issues%2C%20and%20result%20in%20data%20loss%20and%20leakage.

 ZyBooks. (n.d.-b). https://learn.zybooks.com/zybook/TEC101:_Fundamentals_of_Information_Technology_&_Literacy_(TED2415A)/chapter/8/section/2


Comments