Skip to main content

Posts

Showing posts with the label Post #6 – Network Security [CLO: 6]

Network Security

  Information and system security are essential for individuals and organizations because of the potential threats they are exposed to. Most individuals and companies take the necessary steps to protect their information from data breaches, unauthorized access, and other disruptive data security threats to business and consumer data. One of the most common types of attack for which people use the PING command is the ping flood or ping of death. It's a type of Denial of Service (DoS) attack. An attacker attempts to crash, destabilize, or freeze the targeted computer or service by sending malformed or oversized packets using a simple ping command. As I proceed with this assignment, I'll provide a high-level overview of security holes/ vulnerabilities and Social engineering. I will explain why computer systems are vulnerable to each kind of threat, Describe the symptoms and damage that each breach can inflict after compromising a system. I will also propose at least two recomm...