Network Security

docx

School

University Of Arizona *

*We aren’t endorsed by this school

Course

TEC101

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

5

Uploaded by PresidentRamPerson1524

Report
Network Security Many different types of computer security breaches can impact computers, networks, and a person's private information. Some security attacks can be executed by using ping commands. Computer security breaches such as computer viruses and phishing scam emails can infect computers and networks and gain access to personal information. Other forms of security attacks are also executed by using ping commands. Learning how to protect your computer and network from these breaches that make your computer vulnerable is important. There are many ways to protect your computer system or network from threats and attacks. Packet Internet Groper (PING) outlines how a packet journeys through a network. When the ping command is performed, it will send small packets to a designated IP address and request a reply. If the packets reach their destination, it will send a response back. A few attacks that can be executed using the ping commands are Ping flood (ICMP flood) and Ping of Death (POD). Both are a type of distributed denial of service (DDoS) attack, which is when the attacker sends continuous request packets from multiple infected computers to the targeted device or network, causing it to become overwhelmed. This will result in the targeted device or network having network saturation, system resource exhaustion, service disruption, and financial loss. A program that spreads across other computers and runs without the user's permission is called a computer virus. Once a computer gets a virus, it is labeled as infected. Using the Internet to perform a fraudulent scheme that fools people into giving away their money for nothing is an Internet scam. Phishing is one of the most known Internet scams. It is a form of social engineering that tries to lure users to provide sensitive information like usernames, passwords, banking information, and even social security numbers. Emails are the most common phishing method. The emails and links included in the email will look authentic from important
companies like banks, stores, mailing facilities, etc. A malware computer virus can be included in phishing emails and downloadable attachments, luring individuals to download and spread it to others. An individual typically is not aware that harmful software malware has been installed. Malware intention is usually risky for the computer and the user because it causes damage, collects information, and more. Computers are vulnerable to phishing and computer viruses because emails are checked on most computers, which is where phishing and viruses occur the most often. Every computer has valuable and sensitive information, making them prime targets. Simply visiting certain websites or downloading free items, such as illegal videos, games, etc., can infect a computer with viruses. “Many dangerous computer viruses have been spread through e-mail attachments and files downloaded from websites” (Volonino, 2023, para. 4). An individual may open an email with a virus thinking it is legitimate and realize after it opens that it is a fraud email, Not knowing they just allowed a virus onto their computer. Simple user error and a lack of basic network security knowledge like this is how phishing and viruses are successful. Vahid and Lysecky (2019) say that a virus may use a computer to send out spam emails to other computers without the user's permission, collect personal sensitive information like passwords and credit card numbers, or, on rare occasions, it will try to damage the computer. Once a virus has infected a computer, it makes the viruses hard to detect because the infected computer may not show any signs or symptoms of being infected. Some of the few symptoms include the computer performing slower than normal or remaining active while not in use. Being a victim of phishing can be highly stressful and frustrating due to the impact it can have on one's finances and credit because their identity has been stolen. This type of online spam has a low
success rate, but it's free for the spammer, and just from a few victims, the profit can be thousands or more. Being educated on the importance of information and system security can be beneficial not only for individuals but also for employees of organizations. Individuals and employees should understand how information footprints can impact how privacy settings are adjusted to protect information from being shared, knowing that all information is valuable and Internet adequate, and understanding the impact of sharing on the Internet. Back and Guerette stated, “Many cybersecurity experts and scholars assert that cybersecurity awareness education and training is one of the most significant aspects of an institution’s security posture for individuals to effectively fight against cyber threats” (p. 443). This is all crucial information that many people may not know and, if they were educated, would be able to protect themselves and the organizations they work for. System security is vital to learn about the purpose of viruses, malware, spam, etc., and how to defend a computer or network against them. While most email systems filter phishing and spam emails into a spam folder, a few still get through. Knowing how to disassociate a phishing email from an authentic organization email will be one way to defend against these scams. Making sure the link in an email is real or fake is one way to check and can be done by hovering the cursor over the link to make it visible. If the website link in the email has any extra characters or random spaces in the message, it is a spam email and needs to be deleted immediately. It is best to go to the organization's website directly, as you usually would, and verify whether the information provided in the email is legitimate. Another way to reduce phishing and spam emails is not to provide your email when signing up for free trials, creating online accounts, or even on physical forms. Keeping your email more confidential will not be as accessible on the internet and should reduce the spam emails you
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
receive. Having antivirus software, also known as antimalware, installed on your computer is one way to protect your computer from viruses and other forms of malware. Antimalware aims to prevent malware from infecting a computer, find any new malware, and remove the malware found on the computer. If a form of malware is found, the infected file can be repaired, quarantined, or deleted. Another tool to defend against viruses and malware can be a firewall. It blocks unwanted traffic on a network and helps protect the network and computers from malicious software. Firewalls are the first line of defense, so they must be configured to protect an individual or organization best to be effective. Understanding the importance of network security and how to protect your computer system or network from threats and attacks is so valuable in this digital world we are living in. Ensure your antivirus software and firewalls are configured best to defend your network and any computers on your network. Users being informed on what and how spam and phishing emails work will be beneficial in understanding what to watch for and how to avoid becoming a victim of these attacks. This will also keep you from contracting viruses that will infect your computer. Computers are vulnerable to these attacks because of the accessibility of free content on the Internet, and users receive an abundance of spam emails daily and lack knowledge of basic network security. Being a victim of one or more of these attacks leaves you vulnerable to having your personal information stolen and your computer infected, causing it not to perform as effectively. Computer viruses and spam emails can cause so much harm to their victim's personal life, which is why having a protected network and computer from these threats is essential for everyone.
References Back, S., & Guerette, R. T. (2021). Cyber Place Management and Crime Prevention: The Effectiveness of Cybersecurity Awareness Training Against Phishing Attacks. Journal of Contemporary Criminal Justice, 37(2), 427–451. https://doi.org/10.1177/10439862211001628 Vahid, F., & Lysecky, S. (2019). Computing technology for all . zyBooks. https://learn.zybooks.com/zybook/TEC101:_Fundamentals_of_Information_Tec hnology_&_Literacy_(TED2342A) Volonino, L. (2023). Computer viruses and worms. Salem Press Encyclopedia of Science. https://search.ebscohost.com/login.aspx? direct=true&AuthType=shib&db=ers&AN=89312078&site=eds-live&scope=site