Network Security


 

Network Security

Information and system security is extremely important to people and businesses. So much of our personal lives and information is stored online. If not kept safe, it can be accessed to steal our personal information. With such information, people can steal money, identities, our feeling of security, and more.

            One type of attack that can be executed using ping commands is a Denial of Service attack or DoS. This type of attack is done by overwhelming the victim’s server by sending large packets of data. One specific type of DoS attack is a Ping Flood Attack which is performed by, “…sending millions of random requests to a server in an attempt to slow it down to flooding a server with large packets of invalid data” (2022).

            Another type of attack is referred to as social engineering. This type of attack is extremely dangerous as it focuses on human vulnerability.  From an article by Joe Pettit, we learn that the five most common forms of social engineering include, phishing, pretexting, baiting, quid pro quo, and tailgating. The damage that can be done by this attack is allowing the attacker access to the information and/or control they are seeking. This type of attack can have numerous unforeseen symptoms as it is a gateway for other types of attacks. One way to fight against this type of attack is to educate people on proper cybersecurity protocol. Teach them what to look for and be weary of. Another protocol to protect against this type of attack is to have specific security measures in place. For instance, requiring every employee to scan their ID badge when entering a restricted area can help keep out unwanted attackers.

           

            Password Cracking is another form of attack. In password cracking, the attacker is trying to crack the user’s password. There are multiple methods for accomplishing this, including spidering, brute force attacks, and malware. (2022) The same article mentions that, “…the human is the weakest link of any security system.” This is exactly what makes computer systems vulnerable to this type of threat. The damage that can inflicted by these attacks is infinite. By gaining a user’s password, the attacker gains access to whatever information they’re looking for. One recommendation to protect against this type of attack is to have a strong password and change it often. Don’t use obvious words or phrases. Another way to help protect against password cracking is to not share your information with everyone. For example, the Facebook posts that ask you to fill out your old high school and first pets name, are easy ways to gain the information needed to crack your passcodes.

 

 

 

 

 

 

 

 

 

 

 

 

References

 

Editor (2022, March 28). Ping flood attacks. Security Boulevard.

https://securityboulevard.com/2022/03/ping-flood-attacks/

Jancis, M. (2022, June 23). Most popular password cracking techniques: learn how to protect your

privacy. Cybernews. https://cybernews.com/best-password-managers/password-cracking-

techniques/

Pettit, Joe (2022, March 22). 5 Social engineering attacks to watch out for. The State of Security.

https://www.tripwire.com/state-of-security/security-awareness/5-social-engineering-attacks-

to-watch-out-for/

Vahid, F., & Lysecky, S. (2019). Computing technology for all. zyBooks.

 

No comments:

Post a Comment