A Ping is a basic
internet program that allows a user to test and verify if a particular IP
address or website is reachable and active and helps to identify connectivity
and network speed issues. A Ping Flood
is an attack that can be executed using ping commands. A Ping flood is a Denial
Of Service Attack (DoS). In a DoS attack, the attacker sends a large number of
access requests at the same time to one target's website causing the site's web
server to be overloaded and possibly crash (Vahid & Lysecky, 2019).
The two computer
security incidents I will discuss in more detail are Computer viruses and
Phishing. A computer virus is a harmful
code that runs on a user's computer without permission. The malicious computer
code spreads itself from device to device, infecting any computer that opens
the file. The most common way for a virus to spread is through email
attachments. Phishing is a threat in
which attackers try to trick a victim into revealing sensitive information
through fake emails, calls, texts, and websites. The attackers will use the
information to steal personal and financial information. Computer systems are
vulnerable to these types of threats because systems are interconnected and can
be accessed from anywhere.
When a user falls
victim to a phishing attack, the attacker can place viruses on the computer.
The computer virus infects the PC, and the user may notice the speed slow down,
ads pop up randomly, the user could lose access to files, and have their
personal information like credit card numbers and passwords stolen (2017).
The best way to protect a computer
or network from a computer virus is to download Antivirus software. Antivirus
software is a program that looks for known viruses on the hard drive, monitors
websites, and downloads. The antivirus software will disable or quarantine any
virus located. Another recommendation is frequently to check and install any
software updates on the computer. These updates can patch holes found in the
software.
Education and recognition are the best way to
protect from falling victim to a Phishing scam. Never click on a text or email
from a company requesting your personal information, and never provide your
information to a person calling randomly on the phone. If you have any concerns contact the
toll-free number on your bill or use the application or website for the
company. Most reputable companies have a website that beings with HTTPS.
Secondly, protect your accounts by using multi-factor authentication. The extra
protection could be a passcode, pin, or one-time passcode provided by email.
Multi-factor authentication makes it harder for scammers to log into accounts
(2022)
References
Effects of
computer virus . pctechguide.com. (2017, March 24).
https://www.pctechguide.com/virus-removal/how-does-a-virus-impact-my-computer
How to
recognize and avoid phishing scams. Consumer Advice. (2022, October 25).
https://consumer.ftc.gov/articles/how-recognize-and-avoid-phishing-scams
Vahid, F., & Lysecky, S. (2019). Computing technology for all. zyBooks.

Comments
Post a Comment