Information and system
security are essential for individuals and organizations because of the
potential threats they are exposed to. Most individuals and companies take the
necessary steps to protect their information from data breaches, unauthorized
access, and other disruptive data security threats to business and consumer
data.
One of the most common
types of attack for which people use the PING command is the ping flood or ping
of death. It's a type of Denial of Service (DoS) attack. An attacker attempts
to crash, destabilize, or freeze the targeted computer or service by sending
malformed or oversized packets using a simple ping command.
As I proceed with this
assignment, I'll provide a high-level overview of security holes/
vulnerabilities and Social engineering. I will explain why computer systems are
vulnerable to each kind of threat, Describe the symptoms and damage that each
breach can inflict after compromising a system. I will also propose at least
two recommendations for protecting a computer system or network from each type
of security breach and Support my statements with evidence from different
sources.
Security
holes/vulnerabilities are weaknesses, flaws, or errors found within a security
system. In computer security, a weakness in automated systems security
procedures, administrative controls, Internet controls, etc., could be
exploited by a threat to gain unauthorized access to information or disrupt
critical processing. When an organization has this kind of weakness in its
policies, security procedures, internal controls, physical layout, and hardware
designs, they become vulnerable to this kind of attack and harmful events.
Based on an article from the University of Tennessee, some of the symptoms of
such attack include slow network activities, unusual network traffic, an
indication from an intrusion detection tool, system crash, Denial of service
activity, or inability of one or more users to log in to an account; including
admin/root logins to the console, etc. As cited by Ivan Krsul, to protect Your
computer system against vulnerability attacks, organizations need to perform
sophisticated computer analysis on existing vulnerability
information including,
but not limited to, the detection of hidden and significant, and possibly
non-obvious, relationships in vulnerabilities; the application of correlation
and clustering analysis to existing vulnerability information to aid in the
understanding of the relationships between vulnerabilities and the systems they
are found on; and the generation of software engineering tools that will find
vulnerabilities on computer systems before these are deployed. (Krsul, 1997)
On the other hand,
Social engineering is an attack where attackers manipulate people, so they give
up confidential information. The types of information these criminals are
seeking can vary. Still, when individuals are targeted, the criminals are
usually trying to trick you into giving them your passwords or bank
information. Sometimes they try to access your computer to secretly install
malicious software–that will give them access to your passwords and bank
information and give them control over your computer. In this instance,
computers are vulnerable to social engineering unless you fall for the tricks
and give up your personal information or allow them to access your computer
secretly. It is recommended that people follow the following procedure to
protect themselves from social engineering. (Arif Koyun, 2017)
Delete any request for financial information or passwords.
Reject requests for help or offers of help.
Set your spam filters to high
Secure your computing devices
In conclusion, Security
holes and social engineering are two kinds of attacks that can be very harmful
to an individual or organization's computer system. It's essential to the
importance of Information and system security because an attack can cost a lot
of money and damage any computer system.
References
Krsul, Ivan. (1997).
Computer Vulnerability Analysis. Purdue University, 5 -6
https://www.cerias.purdue.edu/assets/pdf/bibtex_archive/97-05.pdf
https://security.tennessee.edu/how-to-tell-if-systems-is-compromised/
Koyun, Arif. Janabi
,Ehssan. (2017). Social Engineering Attacks. Journal of Multidisciplinary
Engineering Science and Technology, 6 -7
https://www.webroot.com/us/en/resources/tips-articles/what-is-social-engineering
Comments
Post a Comment
Comments: