Network Security


 

A Ping is a basic internet program that allows a user to test and verify if a particular IP address or website is reachable and active and helps to identify connectivity and network speed issues.  A Ping Flood is an attack that can be executed using ping commands. A Ping flood is a Denial Of Service Attack (DoS). In a DoS attack, the attacker sends a large number of access requests at the same time to one target's website causing the site's web server to be overloaded and possibly crash (Vahid & Lysecky, 2019).

The two computer security incidents I will discuss in more detail are Computer viruses and Phishing.  A computer virus is a harmful code that runs on a user's computer without permission. The malicious computer code spreads itself from device to device, infecting any computer that opens the file. The most common way for a virus to spread is through email attachments.  Phishing is a threat in which attackers try to trick a victim into revealing sensitive information through fake emails, calls, texts, and websites. The attackers will use the information to steal personal and financial information. Computer systems are vulnerable to these types of threats because systems are interconnected and can be accessed from anywhere.

When a user falls victim to a phishing attack, the attacker can place viruses on the computer. The computer virus infects the PC, and the user may notice the speed slow down, ads pop up randomly, the user could lose access to files, and have their personal information like credit card numbers and passwords stolen (2017). 

The best way to protect a computer or network from a computer virus is to download Antivirus software. Antivirus software is a program that looks for known viruses on the hard drive, monitors websites, and downloads. The antivirus software will disable or quarantine any virus located. Another recommendation is frequently to check and install any software updates on the computer. These updates can patch holes found in the software. 

 Education and recognition are the best way to protect from falling victim to a Phishing scam. Never click on a text or email from a company requesting your personal information, and never provide your information to a person calling randomly on the phone.  If you have any concerns contact the toll-free number on your bill or use the application or website for the company. Most reputable companies have a website that beings with HTTPS. Secondly, protect your accounts by using multi-factor authentication. The extra protection could be a passcode, pin, or one-time passcode provided by email. Multi-factor authentication makes it harder for scammers to log into accounts (2022)

 

 

 

References

Effects of computer virus . pctechguide.com. (2017, March 24). https://www.pctechguide.com/virus-removal/how-does-a-virus-impact-my-computer

How to recognize and avoid phishing scams. Consumer Advice. (2022, October 25).  https://consumer.ftc.gov/articles/how-recognize-and-avoid-phishing-scams

Vahid, F., & Lysecky, S. (2019). Computing technology for all. zyBooks. 

Comments