Network Security


            In this post, I will cover several topics including the importance of information and system security for both individuals and organizations, the types of attacks that can be executed using ping commands, computer viruses, and social engineering. I will also further explain how users are vulnerable to viruses and social engineering as well as the symptoms and damages each can impose. I will also recommend ways that users can help prevent and protect themselves from these types of breaches. 

For both individuals and organizations, having some type of information and system security is crucial. Without the implementation of a form of protection, individuals leave themselves vulnerable to having their personal information like bank account details, credit card information, social security number, identity, and other sensitive personal information stolen.

 As for organizations, the scale of a breach or cyber attack can have even larger implications where hundreds to millions of user’s information is accessed. Large organizations typically amass great storages of sensitive and confidential information including customer data and financial information, intellectual property, and patents. In the case that a large organization is attacked it can also disrupt system operations leading to extended downtime, loss of reputation/trust, and the loss of revenue.

Common types of executable ping attacks include ping flood, smurf, and ping of death attacks. A ping flood attack is a type of denial-of-service (DoS) attack in which the attacker exploits the IP layer protocol by sending a flood of ICMP echo requests that saturate the server disabling its ability to process legitimate user traffic causing it to become unresponsive or to potentially crash. (Mahjabin, T.) 

A smurf attack is a type of Distributed Denial of Service (DDoS) attack. Much like the ping flood attack, a smurf attack is intended to overwhelm a networks server, leaving it unresponsive to legitimate user traffic by sending a large number of ICMP echo requests. The main difference is that a smurf attack originates from multiple sources that appear to be legitimate making them more difficult to moderate.

Lastly, the ping of death, another type of (DoS) attack, is when a cyber attacker sends oversized ping packets to a targeted system with the intentions of overloading or crashing it. The maximum allowable bytes that can be processed is 65,535. If a packet contains more data than the maximum, the packet will cause a memory overflow error.

Computer viruses are a type of software program designed to replicate and spread from one computer to another.  A virus works by inserting or attaching itself to a program, file, or document with the goal of executing its code. When the viruses code is executed, it may either take control of the system, corrupt or destroy system data, or steal data within the system. (Johansen, A.)

Computer systems are vulnerable to viruses as they have many means of infiltrating a system. Viruses can be spread in various ways including vulnerabilities of operating systems, downloading of malicious software which can be disguised in the form of games or music, sharing a device with an infected network, and by using a tactic called social engineering which I will discuss later.

Two recommendations to protect users against computer viruses is to install antivirus software and use a firewall. By having antivirus software, your computer regularly scans for files with known malicious code patterns aka “signatures” and removes them from the system.  By having a firewall in place, incoming and outgoing packets of data are monitored and filtered. If the data follows a set of predefined criteria it is allowed. However, if the data does not meet the criteria it is blocked.

Social engineering is a tactic that uses psychological manipulation to influence or persuade individuals to disclose information that they otherwise wouldn’t share like passwords, credit card and banking information, social security numbers, etc. With this information, cybercriminals can wreak havoc on user’s credit and bank accounts leaving them in debt. Also, by accessing sensitive information, cyber criminals may damage the reputation of users and may also blackmail or publicly humiliate them.

 According to ISACA’s State of Security report, social engineering is the leading cause of network compromise today. (IBM) Often referred to as “human hacking, one’s system may become vulnerable or compromised for many reasons including having a lack of awareness of social engineering, users being to open or trustworthy with their data on the internet, weak passwords, outdated software, and often users leave their devices unattended. For example, leaving an account open on a public library computer leaves your information susceptible and accessible.

There are ways for users to better protect themselves from social engineering. It isn’t full proof, but the likely hood decreases significantly. The best way to protect yourself from this type of manipulative tactic is to educate yourself and know what to look for. By increasing your awareness of social engineering and understanding the strategies cybercriminals use, it is easier for users to identify these fraudulent attempts and avoid the exploitation of your information. Another way of reducing the likely hood of social engineering is to verify the source. It is a safe practice to call the known and legitimate source first and question the validity of the request. By doing this, it will also help the organization to inform its customers and associates of the fraudulent activity.

Comments

Popular posts from this blog

Mobile App Critique : Pokémon GO!

Java Installation and Object-Oriented Design Principles for Beginners

Week 5 Final Project: Blog Reflection Paper