TEC101 Post #6 - Network Security


The Importance of System Security

  

               Computer attacks have become more common with the advancement of technology.  There are multiple ways to attack or infiltrate computers and computer networks with outcomes ranging from destroying a computer and leaving it or a complete network inoperable to stealing personal data to use for criminal purposes.  There are numerous ways computers can be attacked. The more popular threats prey on the users, often hiding in emails, hoping the users don’t realize what they truly are.

Ping attacks can be used to overwhelm or flood computer systems.  The congestion caused by multiple pings can slow down or block a network from receiving data.  Excessive amounts of pings or large data packets can also impact the function of a network and possibly cause a system to crash. Any computer that has outside access is vulnerable to a ping attack.

Email phishing is a popular form of cyber-attack that can affect both individuals and companies equally.  In 2019, 95% of all successful phishing attacks resulted from human error (Wright, et al., 2023).  Phishing allows the creator to gain access to a network or personal information when a user clicks on a deceptive link or attachment within an email. 

Spam is defined as a junk or unwanted message sent to an Internet users mailbox and is a severe threat to the internet and society, (Samarthrao, et al. 2022). Email spam can deploy a few types of threats.  Email spam can disable your email when it is opened, hide important email, or possibly cause a denial of service (DoS) attack.  Email spam is also how phishing scams are usually sent to users. Spam can possibly stop the user from sending or receiving emails, clog their inbox or infect the network email system.

            Not all threats can be stopped but if the user is proactive and remains vigilant, they can avoid most threats.  The most important way to fight threats is through knowledge. Users need to be aware of what types of threats are being deployed and how to spot them.  Using virus protection and firewalls will also help keep threats at bay.  Unfortunately, no matter what type of prevention we use to fight threats, technology is always changing and it is virtually impossible to avoid all threats.




References

Wright, R. T., Johnson, S. L., & Kitchens, B. (2023). Phishing Susceptibility in Context: A Multilevel Information Processing Perspective on Deception Detection. MIS Quarterly47(2), 803–832. https://doi.org/10.25300/MISQ/2022/16625

 

Samarthrao, K. V., & Rohokale, V. M. (2022). Enhancement of email spam detection using improved deep learning algorithms for cyber security. Journal of Computer Security30(2), 231–264. https://doi.org/10.3233/JCS-200111


Comments