Network Security
Discussing Computer Viruses and Phishing:
In this assignment, I have chosen to focus on computer viruses and phishing, delving into their significance in today's world of information and system security. This paper will explore the various types of attacks that can be carried out using ping commands, highlighting the importance of information and system security. Additionally, we will analyze the vulnerabilities, potential damages, and recommended protective measures against computer viruses and phishing, which are common security incidents.
The protection of sensitive data and information, preservation of privacy, and prevention of unauthorized access are fundamental aspects of information and system security. Individuals and organizations depend on secure systems to protect personal information, confidentiality, financial transactions, etc. Breaches in security can lead to troubling outcomes such as private reputation exposure, financial loss, and comprised customer trust. When it comes to attacks utilizing the ping command, there exist diverse forms of attacks, including a flood attack known as ICMP flood. In this type of attack, the attacker floods the intended device or network with a constant stream of request packets (pings), aiming to overwhelm its resources. A different form of ping attack is commonly referred to as the "ping of death" (PoD). This attack entails sending excessively large or malformed packets to a targeted device, causing it to freeze, crash or initiate a reboot.
Malicious software programs, commonly known as computer viruses, are designed to replace and spread by attaching themselves to legitimate files or programs to avoid the user from detecting them before it’s too late. Computer viruses remain a significant and pressing issue in today’s world, often resulting in the loss of valuable information (Tavori & Levy 2022). They can manipulate vulnerabilities in computer systems through various ways by exploiting security flaws in operating systems or applications to gain unauthorized access, steal personal and confidential information, or cause system issues. Viruses are prone to develop through computers by people clicking on deceiving emails or links that are malicious. Also, computer viruses can delete/corrupt files. To safeguard your computer system against computer viruses, ensure that your system is regularly updated, install antivirus software, and exercise caution when encountering suspicious emails and untrustworthy websites, refraining from clicking on them.
Conversely, phishing refers to deceitful endeavors that aim to acquire sensitive information, such as usernames, passwords, or financial details, by imitating it as a reliable and trustworthy entity (Desolda et al. 2023). As an example, if an attacker successfully deceives someone into opening a malicious link, it can result in the installation of malware software like ransomware or spyware onto the computer system, leading to the exposure of personal information. Numerous companies, particularly those operating at a high level where employees interact with emails daily, incorporate a phishing button within their applications. This button serves to alert the company to potential risks, enabling prompt evaluation and proactive measures to protect the company from any significant mishaps. After falling victim to a phishing attack, individuals may experience identity theft or unauthorized account access. To safeguard your computer system against phishing attacks, it is essential to take several precautions. Firstly, install reliable security software that can detect and prevent phishing attempts. To fortify the security of your accounts, consider enabling multi-factor authentication, a valuable feature that introduces an additional level of safeguarding. Additionally, consider disconnecting your computer from the internet when not in use to minimize the risk of unauthorized access. Lastly, regularly conduct virus scans to identify and remove any malware that may have been installed through phishing attempts. In the event of a phishing incident, rapidly change all your passwords as a precautionary measure. Both computer viruses and phishing pose significant threats, emphasizing the importance of staying vigilant and keeping computers protected with up-to-date security software.
Desolda, G., Ferro, L.
S., Marrella, A., Catarci, T., & Costabile, M. F. (2022). Human Factors in
Phishing Attacks: A Systematic Literature Review. ACM Computing Surveys, 54(8),
1–35. https://doi.org/10.1145/3469886
Tavori, J., & Levy,
H. (2023). Resilience of Networks to Spreading Computer Viruses: Optimal
Anti-Virus Deployment. NOMS 2023-2023 IEEE/IFIP Network Operations and
Management Symposium, Network Operations and Management Symposium, NOMS
2023-2023 IEEE/IFIP, 1–5. https://doi.org/10.1109/NOMS56928.2023.10154217
Comments
Post a Comment