The Importance of System Security
Computer
attacks have become more common with the advancement of technology. There are multiple ways to attack or
infiltrate computers and computer networks with outcomes ranging from destroying
a computer and leaving it or a complete network inoperable to stealing personal
data to use for criminal purposes. There
are numerous ways computers can be attacked. The more popular threats prey on
the users, often hiding in emails, hoping the users don’t realize what they
truly are.
Ping
attacks can be used to overwhelm or flood computer systems. The congestion caused by multiple pings can
slow down or block a network from receiving data. Excessive amounts of pings or large data
packets can also impact the function of a network and possibly cause a system
to crash. Any computer that has outside access is vulnerable to a ping attack.
Email phishing is a popular form of cyber-attack
that can affect both individuals and companies equally. In 2019, 95% of all successful phishing
attacks resulted from human error (Wright, et al., 2023). Phishing allows the creator to gain access to
a network or personal information when a user clicks on a deceptive link or
attachment within an email.
Spam is defined as a junk or unwanted
message sent to an Internet users mailbox and is a severe threat to the
internet and society, (Samarthrao, et
al. 2022). Email spam can deploy a few types of threats. Email spam can disable your email when it is
opened, hide important email, or possibly cause a denial of service (DoS)
attack. Email spam is also how phishing
scams are usually sent to users. Spam can possibly stop the user from sending
or receiving emails, clog their inbox or infect the network email system.
Not all threats can be stopped but if the user is
proactive and remains vigilant, they can avoid most threats. The most important way to fight threats is
through knowledge. Users need to be aware of what types of threats are being deployed
and how to spot them. Using virus
protection and firewalls will also help keep threats at bay. Unfortunately, no matter what type of prevention
we use to fight threats, technology is always changing and it is virtually
impossible to avoid all threats.
References
Wright, R. T., Johnson, S. L., & Kitchens, B. (2023). Phishing
Susceptibility in Context: A Multilevel Information Processing Perspective on Deception
Detection. MIS Quarterly, 47(2), 803–832. https://doi.org/10.25300/MISQ/2022/16625
Samarthrao, K. V., & Rohokale, V. M. (2022). Enhancement of email
spam detection using improved deep learning algorithms for cyber
security. Journal of Computer Security, 30(2), 231–264.
https://doi.org/10.3233/JCS-200111

Comments
Post a Comment