Thursday, August 27, 2020

Network Security

 

These last few weeks have taught me a lot about the vulnerability and lack off anonymity while using computers. I have learned how to use ping commands to learn about your own network setup and traceroute commands to identify where the packets go that you send out based on the servers of the location of the address. A ping command can be used in an attack. “Ping of Death (a.k.a. PoD) is a type of Denial of Service (DoS) attack in which an attacker attempts to crash, destabilize, or freeze the targeted computer or service by sending malformed or oversized packets using a simple ping command” (2019).

I also want to talk about Email Spam. All types of computer systems are subject to email spam. If you can receive email on your computer or device, you can receive this type of security incident. “Spam is unwanted mass-sent email. Most spam advertises products or sites (often porn sites). Some (about 5%) is used for phishing or spreading malware (like viruses). Because spam costs the sender almost nothing, spam has grown tremendously, making up 50%-80% of all Internet email traffic in 2014” (Vahid & Lysecky, 2017, CH 8). As mentioned above, the symptoms of email spam are advertisements or other products offered in your email. To prevent incidents occurring from spam, only open emails that you know you can trust. If you see emails that look suspicious or offers that seem too good to be true, they probably are. Another way to avoid spam is to limit who gets your information. If you are just shopping on the web, be cautious about who you give your email address too.

Computer viruses have cost billions of dollars in repairs and man hours. Computers are more vulnerable to viruses than phones or devices that have newer Operating Systems. “The most common way for a virus to spread is via email, where a user is tricked into downloading and running an application that installs a virus” (Vahid & Lysecky, 2017, CH 8). If you have a virus, you will know if you have anti-virus software. You may also notice your computer doing strange things on its own. To prevent receiving a virus, it is recommended to have anti-virus software that is reliable such as McAfee. You should also ensure your OS is up to date. “Whether you are running Windows, Mac OS X, Linux, or any other OS, keep it up to date. OS developers are always issuing security patches that fix and plug security leaks. These patches will help to keep your system secure” (Benton, 2014).

  

References:

 

Benton, B., Kota, P., Anagnost, A., & O’Connell, K. (2018, December 21). Infected! 10 Tips How To Prevent Malware On Your Computer. Retrieved August 24, 2020, from https://www.autodesk.com/redshift/10-tips-on-how-to-prevent-malware-from-infecting-your-computer/

Vahid, F., & Lysecky, S. (2017). Computing technology for all. Retrieved from zybooks.zyante.com/

What is Ping of Death (PoD): DDoS Attack Glossary: Imperva. (2019, December 29). Retrieved August 24, 2020, from https://www.imperva.com/learn/ddos/ping-of-death/

No comments:

Post a Comment

Tech Topic Discussion

  Tech Topic Discussion   Discuss how your selected tech topic connects to the fundamentals of information technology covered in this course...