Network Security
Introduction
There are various types of security
used around the World. Some types are within the financial system in the forms
of debt and equity while others are more physical such as a guard or a bouncer.
While those types of security are valuable to those entities, one type of
security that is imperative to have in the World today is network security.
According to Poole (2002), “Network security is an important issue, because of
the dependence and utilization of computer networks to store, access, and
provide business information, internally within an organization and externally
to customers and suppliers.” (p.1). With so many dependent on the use of
networks and the internet, it is critical precautions are taken to ensure
network safety against the different types of attacks.
When it comes to the types of
attacks, one that some may not take into consideration is the ability to attack
using ping commands. A ping command attack can come in many different ways, but
3 common ping attacks are application layer attacks, protocol attacks, and
volumetric attacks. An application layer attack is when there is an attempt to
request the same source from a server via hacker bots with the hopes of
overwhelming the source. A protocol attack is also known as an SYN flood
attack. Typically, two computers will communicate via a TCP handshake in which
a SYN packet is the initial step. A hacker will send multiple SYN packets to a
location in an attempt to flood the server and in turn crash the location. A
volumetric attack is when there is an attempt to overload a website, network,
or email with false requests to the resource to deny real users the ability to
access the site. As with any issue encountered, the true way to combat these
types of attacks is by recognizing the signals. If anything looks out of the
ordinary on a network system, then there is a good chance an attempted attack
might be taking place and precautionary measures need to be taken. One way
anyone can protect themselves against these types of attacks is by ensuring
they are using up-to-date equipment. This will make sure any equipment has the
latest updates for any software or patches. Another way to help protect against
these attacks is to set up and configure firewalls and routers. This will help
in the fight against any attacks by eliminating any easy entry into the
network. (Keary, 2019).
Other types of network
attacks that are more widely known are computer viruses and phishing attempts.
A computer virus can happen on any type of mobile device and could have
devastating effects, especially if that device is connected to a major network.
According to Descy (2006), a computer virus is “a software program capable of
reproducing itself and usually capable of causing great harm to files or other
programs on the same computer”. A computer virus can be a small issue for some,
but in the case of a business or corporation, a computer virus can take down an
entire network system. One way to protect against a virus is by installing the
latest anti-virus software on devices. Many businesses now require anti-virus
software to be installed on a computer or laptop before it connects to the
network. There are even policies in place that do not allow personal devices to
be used on the company’s network to ensure a higher level of security. Another
way is by installing the latest Operating System and staying up to date on any
updates. This will allow for any bugs to be fixed with any patches.
When it comes to phishing,
many of the uninformed in the field of computers may think of the word as
pairing with a pole and bait. In actuality, the concepts are the same. With
phishing, an attempt to gather personal information is sent out to a sea of
multiple targets in hopes that one victim will “bite”. This is typically done
via email and comes in the form of a legitimate-looking email subject from
either a financial institution or subscription entity requiring account
information. Within the urgent email, there is typically a link to a website
which is then used to gather the information and then taken by the hacker.
(Desolda, 2022). In either case, the motivation is to infiltrate a computer,
server, or personal account to gather the information that can then be used by
a hacker or group. Due to the overwhelming viruses and phishing attempts, many
companies are now mandating network security courses and certifications to
better educate employees and to help keep systems safe which is one way to
combat these attacks. Another method of protection is by setting up email
filters that can prioritize emails and determine which may be a phishing
attack.
Many of these threats come at
all levels of severity. These threats can cause simple annoyances for a user or
in many cases, can bring entire networks and servers down. With each threat,
there are also different levels of vulnerability. With ping command attacks,
systems can be vulnerable if there aren’t enough resources or backups to
counteract the constant pings on the system, thus bringing down a system in a
matter of seconds. One way to recognize a ping attack is if the network
activity suddenly jumps and there is a presence of major activity. Computer
viruses can also be lightweight or cause havoc on a system. For a single-use
device, it can lock out the user, cause various pop-up screens, or even lock
out important documents. If a computer virus is found on a device connected to
a network, there is the possibility of the virus attacking other devices and
servers and ultimately creating a snowball effect for anything connected. These
types of attacks can come in the forms of boot viruses, browser hijacking
viruses, file infecting viruses, and many more. These can display symptoms of
issues with booting up a computer, a change in the browser URL, and file names
suddenly changing or disappearing.
Phishing attempts are
slightly more difficult to recognize since they can typically look like a
standard email. Many of the vulnerabilities are due to an inexperienced user
and in some cases, due to the subject matter of the email. These types of
attacks can take someone’s personal information and use it either against them
or be sold to others. The symptoms of these attacks aren’t as obvious as other
attacks, yet still pose a great threat.
Conclusion
The World of today is much
different than just 5 years ago. We now have multiple forms of smart devices
that communicate with various networks at all hours of the day. This new World
creates the ability to be connected at all times but opens the door for
malicious activity as well. More than ever, it is imperative we act against
those attacks to keep our devices secure. Whether it be a smartphone, laptop,
or smart TV, there is always a possibility of someone gaining access with just
a click of a button. We now live in a World that is dependent on network connectivity,
therefore it is our responsibility to keep those networks safe and secure by
utilizing all resources available, which will only be beneficial to our digital
World.
Resources
Descy,
D. (2006). Protecting your Computer from Viruses. TechTrends: Linking Research
& Practice to Improve Learning, 50(4), 3–4.
https://doi.org/10.1007/s11528-006-0003-7
DESOLDA, G., FERRO, L. S., MARRELLA, A., CATARCI,
T., & COSTABILE, M. F. (2022). Human Factors in Phishing Attacks: A
Systematic Literature Review. ACM Computing Surveys, 54(8), 1–35. https://doi.org/10.1145/3469886
Federal Trade Commission. (September 2022). How to
Recognize and Avoid Phishing Scams.
https://consumer.ftc.gov/articles/how-recognize-and-avoid-phishing-scams#protect
Keary, T.
(August 22, 2019). How to Stop a DDos Attack (+6 Tips for Preventing Them). Learn.g2.com
https://learn.g2.com/how-to-stop-a-ddos-attack
Onelogin (n.d.). What is a DDoS Attack?
https://www.onelogin.com/learn/ddos-attack
Poole,
Owen. Network Security : A Practical Guide, Taylor & Francis Group, 2002.
ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/ashford-ebooks/detail.action?docID=298471.
Proofpoint. (n.d.) What Is a Computer
Virus?
https://www.proofpoint.com/us/threat-reference/computer-virus
Vahid, F., & Lysecky, S. (2019). Computing
technology for all. zyBooks.
Comments
Post a Comment