Skip to main content

Network Security

 

Information and system security are essential for individuals and organizations because of the potential threats they are exposed to. Most individuals and companies take the necessary steps to protect their information from data breaches, unauthorized access, and other disruptive data security threats to business and consumer data.

One of the most common types of attack for which people use the PING command is the ping flood or ping of death. It's a type of Denial of Service (DoS) attack. An attacker attempts to crash, destabilize, or freeze the targeted computer or service by sending malformed or oversized packets using a simple ping command.

As I proceed with this assignment, I'll provide a high-level overview of security holes/ vulnerabilities and Social engineering. I will explain why computer systems are vulnerable to each kind of threat, Describe the symptoms and damage that each breach can inflict after compromising a system. I will also propose at least two recommendations for protecting a computer system or network from each type of security breach and Support my statements with evidence from different sources.

Security holes/vulnerabilities are weaknesses, flaws, or errors found within a security system. In computer security, a weakness in automated systems security procedures, administrative controls, Internet controls, etc., could be exploited by a threat to gain unauthorized access to information or disrupt critical processing. When an organization has this kind of weakness in its policies, security procedures, internal controls, physical layout, and hardware designs, they become vulnerable to this kind of attack and harmful events. Based on an article from the University of Tennessee, some of the symptoms of such attack include slow network activities, unusual network traffic, an indication from an intrusion detection tool, system crash, Denial of service activity, or inability of one or more users to log in to an account; including admin/root logins to the console, etc. As cited by Ivan Krsul, to protect Your computer system against vulnerability attacks, organizations need to perform sophisticated computer analysis on existing vulnerability

information including, but not limited to, the detection of hidden and significant, and possibly non-obvious, relationships in vulnerabilities; the application of correlation and clustering analysis to existing vulnerability information to aid in the understanding of the relationships between vulnerabilities and the systems they are found on; and the generation of software engineering tools that will find vulnerabilities on computer systems before these are deployed. (Krsul, 1997)

 

On the other hand, Social engineering is an attack where attackers manipulate people, so they give up confidential information. The types of information these criminals are seeking can vary. Still, when individuals are targeted, the criminals are usually trying to trick you into giving them your passwords or bank information. Sometimes they try to access your computer to secretly install malicious software–that will give them access to your passwords and bank information and give them control over your computer. In this instance, computers are vulnerable to social engineering unless you fall for the tricks and give up your personal information or allow them to access your computer secretly. It is recommended that people follow the following procedure to protect themselves from social engineering. (Arif Koyun, 2017)

       Delete any request for financial information or passwords.

       Reject requests for help or offers of help.

       Set your spam filters to high

       Secure your computing devices

 

 

In conclusion, Security holes and social engineering are two kinds of attacks that can be very harmful to an individual or organization's computer system. It's essential to the importance of Information and system security because an attack can cost a lot of money and damage any computer system.

 

 

 

 

References

 

Krsul, Ivan. (1997). Computer Vulnerability Analysis. Purdue University, 5 -6

https://www.cerias.purdue.edu/assets/pdf/bibtex_archive/97-05.pdf


https://security.tennessee.edu/how-to-tell-if-systems-is-compromised/

Koyun, Arif. Janabi ,Ehssan. (2017). Social Engineering Attacks. Journal of Multidisciplinary Engineering Science and Technology, 6 -7

https://www.webroot.com/us/en/resources/tips-articles/what-is-social-engineering

 

<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-4489055007945767"
     crossorigin="anonymous"></script>

Comments