Search

Wednesday, February 28, 2024

Network Security

 

Introduction

            Whether it is considering an individual or an organization, information and system security are crucial to have in all computers. Having security protects personal documents and information from intruders and an organization’s confidentiality such as statistics, employee payrolls, and the personal identifiable information (PII) of its employees.

Ping Attacks

            Ping attacks can be used to breach the safety of computers in multiple forms, a couple of them being the Ping of Death and a Ping Flood. While these two are similar, they do differ in important ways. For example, a ping flood attack is when multiple compromised systems send a huge volume of Internet Control Message Protocol (ICMP) echo packets to the target; in simpler terms, as implied by the name, it floods the target’s computer with a large number of requests and the system tries to respond to every ICMP request with a reply packet. This causes the target system to be overwhelmed and occupies all inbound bandwidth which prevents users from accessing the system.

On the other hand, the Ping of Death attack is a denial-of-service (DOS) attack, it is a variant of the ping flood as instead of sending many corrupted files, this attack consists of sending oversized packets that exceed the maximum IPv4 packet size (Internet Protocol version 4 (IPv4) is a packet that is made of 65,535 bytes). As the computer struggles to process these oversized packets, it crashes.


 

Security Incidents

            Having a computer can lead to security incidents such as phishing and computer viruses. Phishing is essentially when scam emails or text messages are sent. Within these messages are links to malicious websites that either contain malware, gather sensitive information, or transferring money; they can target individuals or organizations. Computer viruses targets files and systems of a computer and then replicating itself. These are primarily spread through email and often require user action to activate. Viruses can damage data files, destroy files, and even spread to other computers and networks.

Computers are vulnerable to threats because threats are usually computer programs designed to infiltrate and target sensitive information. For example, viruses are programs that computers can easily run, phishing consists of links via your computer to trick you into exposing your own private information, and the way they all relate is that they are created by a computer to target another computer.  If a computer gets hit with a virus, a couple of symptoms it can experience are things like corrupted information, loss of files, and accessing your email to spread the virus to people close to you.

In order to protect from these security incidents, some very important steps to take are to avoid clicking on unknown links, even from people you know until you can confirm it with them in-case their system has been compromised too. Another action is to back up all files and data, especially the important personal information. And lastly, use a trusted anti-virus to protect your computer from intruders and dangerous programs; my current anti-virus software is Avast.

 

 

Conclusion

Understanding all the risks your computer is subject to is already a massive step in knowing how to protect yourself from these intruders that wish to steal information and do you harm. Not only does this minimize the risk of your computer being affected, it also reduces the risk of contacts being infected and continuing to spread.


 

References

Fortinet. (n.d.). What is a Ping of Death and ping of death attack? https://www.fortinet.com/resources/cyberglossary/ping-of-death

Imperva. (2023, December 20). What is a Ping Flood: ICMP Flood Ddos Attack: Imperva. Learning Center. https://www.imperva.com/learn/ddos/ping-icmp-flood/

Phishing attacks: Defending your organisation. NCSC. (2018, February 5). https://www.ncsc.gov.uk/guidance/phishing

CISA. (2024, February 14). Virus basics: CISA. Cybersecurity and Infrastructure Security Agency CISA. https://www.cisa.gov/news-events/news/virus-basics

No comments:

Post a Comment

History and Future of Computers

  Introduction             In modern times, the computer has had an essential role in the continued sustainment and advancement of society...