About

Thursday, July 15, 2021

Network Security

 




   
 Both information and system security are equally important for individuals as it is for
organizations. Information weather it is public or not holds a lot of value, especially in a
technologically advanced World. Personal identifying factors about an individual can be
identified based on their online activity such as geographical location, language usage and face (Vahid, 2017). The internet holds an electronic footprint of activities performed online. The same goes for organizations. Safeguarding their information and systems is very important. If not protected they can experience interferences in the form of data breaches, corruption, and exposure of non­public information. This can occur at an individual level or organization level.

    Ping commands can be very useful for troubleshooting but can also be used as a method of
attack. Pings can be used in such a way that they cause vulnerable systems to freeze and crash. This can be accomplished by using the Internet Control Message Protocol (ICMP) or any other IP ­based protocols. Malicious data packets are sent to the targeted system that exceed their maximum size and lead to an overflow in memory.

Phishing is an internet scam that baits a user to share sensitive information that is not
public such as passwords and credit card numbers (Vahid, 2017). Anyone with an email is
vulnerable to a phishing email scam. In this type of attack, attackers lure victims to fake pages
using social engineering techniques (Dadkhah, 2015). These scams can look like every day
emails from Amazon, Google or businesses that we typically do business with. Safeguarding
against this type of attack can be as simple are looking at the full email address where the email came from and looking for spelling and grammatical errors.

Passwords are used as a means of authentication to safeguard information on website,
information systems and social networks. Password cracking occurs through databases that are employee social engineering to obtain passwords. The Online Journal of Applied Knowledge Management, encourages effective password management by requiring periodic replacement, use of different passwords for every account, and discouraging from using personal information in passwords (Gafni, 2017). Password cracking can give intruders access to bank accounts, personal information, and other sensitive data.



Dadkhah, M., Sutikno, T., Jazi, M. D., & Stiawan, D. (2015). An introduction to vahid, F., & lysecky, S. (2017). Computing technology for all. Retrieved from zybooks.zyante.com/Phishings and Their Detection Approach. Telkomnika, 13(2), 373–380. https://doi­org.proxy­library.ashford.edu/10.12928/TELKOMNIKA.v13i2.1436

Gafni, R., Pavel, T., Margolis, R., & Weiss, B. (2017). Strong password? Not with your social
network data! Online Journal of Applied Knowledge Management, 5(1), 27–41.
https://doi­org.proxy­library.ashford.edu/10.36965/ojakm.2017.5(1)27­41

Vahid, F., & Lysecky, S. (2017). Computing technology for all. https://zybooks.zyante.com


No comments:

Post a Comment

Tech Topic Connection