Network Security
docx
keyboard_arrow_up
School
University Of Arizona *
*We aren’t endorsed by this school
Course
TEC101
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
5
Uploaded by PresidentRamPerson1524
Network Security
Many different types of computer security breaches can impact computers, networks, and
a person's private information. Some security attacks can be executed by using ping commands.
Computer security breaches such as computer viruses and phishing scam emails can infect
computers and networks and gain access to personal information. Other forms of security attacks
are also executed by using ping commands. Learning how to protect your computer and network
from these breaches that make your computer vulnerable is important. There are many ways to
protect your computer system or network from threats and attacks.
Packet Internet Groper (PING) outlines how a packet journeys through a network. When
the ping command is performed, it will send small packets to a designated IP address and request
a reply. If the packets reach their destination, it will send a response back. A few attacks that can
be executed using the ping commands are Ping flood (ICMP flood) and Ping of Death (POD).
Both are a type of distributed denial of service (DDoS) attack, which is when the attacker sends
continuous request packets from multiple infected computers to the targeted device or network,
causing it to become overwhelmed. This will result in the targeted device or network having
network saturation, system resource exhaustion, service disruption, and financial loss.
A program that spreads across other computers and runs without the user's permission is
called a computer virus. Once a computer gets a virus, it is labeled as infected. Using the Internet
to perform a fraudulent scheme that fools people into giving away their money for nothing is an
Internet scam. Phishing is one of the most known Internet scams. It is a form of social
engineering that tries to lure users to provide sensitive information like usernames, passwords,
banking information, and even social security numbers. Emails are the most common phishing
method. The emails and links included in the email will look authentic from important
companies like banks, stores, mailing facilities, etc. A malware computer virus can be included in
phishing emails and downloadable attachments, luring individuals to download and spread it to
others. An individual typically is not aware that harmful software malware has been installed.
Malware intention is usually risky for the computer and the user because it causes damage,
collects information, and more.
Computers are vulnerable to phishing and computer viruses because emails are checked
on most computers, which is where phishing and viruses occur the most often. Every computer
has valuable and sensitive information, making them prime targets. Simply visiting certain
websites or downloading free items, such as illegal videos, games, etc., can infect a computer
with viruses. “Many dangerous computer viruses have been spread through e-mail attachments
and files downloaded from websites” (Volonino, 2023, para. 4). An individual may open an email
with a virus thinking it is legitimate and realize after it opens that it is a fraud email, Not
knowing they just allowed a virus onto their computer. Simple user error and a lack of basic
network security knowledge like this is how phishing and viruses are successful.
Vahid and Lysecky (2019) say that a virus may use a computer to send out spam emails to
other computers without the user's permission, collect personal sensitive information like
passwords and credit card numbers, or, on rare occasions, it will try to damage the computer.
Once a virus has infected a computer, it makes the viruses hard to detect because the infected
computer may not show any signs or symptoms of being infected. Some of the few symptoms
include the computer performing slower than normal or remaining active while not in use. Being
a victim of phishing can be highly stressful and frustrating due to the impact it can have on one's
finances and credit because their identity has been stolen. This type of online spam has a low
success rate, but it's free for the spammer, and just from a few victims, the profit can be
thousands or more.
Being educated on the importance of information and system security can be beneficial
not only for individuals but also for employees of organizations. Individuals and employees
should understand how information footprints can impact how privacy settings are adjusted to
protect information from being shared, knowing that all information is valuable and Internet
adequate, and understanding the impact of sharing on the Internet. Back and Guerette stated,
“Many cybersecurity experts and scholars assert that cybersecurity awareness education and
training is one of the most significant aspects of an institution’s security posture for individuals
to effectively fight against cyber threats” (p. 443). This is all crucial information that many
people may not know and, if they were educated, would be able to protect themselves and the
organizations they work for. System security is vital to learn about the purpose of viruses,
malware, spam, etc., and how to defend a computer or network against them.
While most email systems filter phishing and spam emails into a spam folder, a few still
get through. Knowing how to disassociate a phishing email from an authentic organization email
will be one way to defend against these scams. Making sure the link in an email is real or fake is
one way to check and can be done by hovering the cursor over the link to make it visible. If the
website link in the email has any extra characters or random spaces in the message, it is a spam
email and needs to be deleted immediately.
It is best to go to the organization's website directly,
as you usually would, and verify whether the information provided in the email is legitimate.
Another way to reduce phishing and spam emails is not to provide your email when signing up
for free trials, creating online accounts, or even on physical forms. Keeping your email more
confidential will not be as accessible on the internet and should reduce the spam emails you
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
receive. Having antivirus software, also known as antimalware, installed on your computer is one
way to protect your computer from viruses and other forms of malware. Antimalware aims to
prevent malware from infecting a computer, find any new malware, and remove the malware
found on the computer. If a form of malware is found, the infected file can be repaired,
quarantined, or deleted. Another tool to defend against viruses and malware can be a firewall. It
blocks unwanted traffic on a network and helps protect the network and computers from
malicious software. Firewalls are the first line of defense, so they must be configured to protect
an individual or organization best to be effective.
Understanding the importance of network security and how to protect your computer
system or network from threats and attacks is so valuable in this digital world we are living in.
Ensure your antivirus software and firewalls are configured best to defend your network and any
computers on your network. Users being informed on what and how spam and phishing emails
work will be beneficial in understanding what to watch for and how to avoid becoming a victim
of these attacks. This will also keep you from contracting viruses that will infect your computer.
Computers are vulnerable to these attacks because of the accessibility of free content on the
Internet, and users receive an abundance of spam emails daily and lack knowledge of basic
network security. Being a victim of one or more of these attacks leaves you vulnerable to having
your personal information stolen and your computer infected, causing it not to perform as
effectively. Computer viruses and spam emails can cause so much harm to their victim's personal
life, which is why having a protected network and computer from these threats is essential for
everyone.
References
Back, S., & Guerette, R. T. (2021). Cyber Place Management and Crime Prevention:
The Effectiveness of Cybersecurity Awareness Training Against Phishing
Attacks. Journal of Contemporary Criminal Justice, 37(2), 427–451.
https://doi.org/10.1177/10439862211001628
Vahid, F., & Lysecky, S. (2019).
Computing technology for all
. zyBooks.
https://learn.zybooks.com/zybook/TEC101:_Fundamentals_of_Information_Tec
hnology_&_Literacy_(TED2342A)
Volonino, L. (2023). Computer viruses and worms. Salem Press Encyclopedia of Science.
https://search.ebscohost.com/login.aspx?
direct=true&AuthType=shib&db=ers&AN=89312078&site=eds-live&scope=site