Network Security

Information and system security are essential for individuals and organizations because they protect sensitive data, maintain system integrity, and ensure continuity of operations. Without proper security measures, systems are vulnerable to a wide range of attacks that can result in financial loss, identity theft, and damage to reputation. One standard method used in network-based attacks is the ping command, designed to test a device's availability and latency on a network. However, it can also be exploited in Denial-of-Service (DoS) or Distributed Denial-of-Service (DDoS) attacks, specifically through Ping Floods or ping-of-death attacks. A Ping Flood overwhelms a target system with ICMP echo requests, consuming network bandwidth and processing power until the system slows down or crashes. The Ping of Death, though largely mitigated in modern systems, sends malformed or oversized packets that can cause buffer overflows and system instability (Khuler, 2024).


Ransomware and phishing are two notable security threats that expose computer systems to risk. Ransomware attacks exploit software vulnerabilities or social engineering to encrypt a victim's files, demanding payment for a decryption key. Systems are vulnerable to ransomware due to outdated software, poor patch management, or users clicking on malicious links. Symptoms include inaccessible files, ransom notes, and drastically reduced system performance. Damage can range from data loss to significant financial and reputational consequences, especially for businesses. Organizations should regularly update software, back up critical data, and use endpoint protection software to prevent ransomware. Phishing, conversely, deceives users into revealing confidential information through fake emails or websites. Vulnerabilities arise from a lack of user training and poor email filtering. Once a user is tricked into clicking a link or submitting personal information, attackers can gain access to login credentials or install malware. Symptoms include unauthorized account access and data leaks. To defend against phishing, organizations should implement multi-factor authentication (MFA) and conduct regular cybersecurity awareness training (Volonino, 2024). Both threats highlight the importance of proactive, layered security strategies to protect against evolving cyber threats.


References: 

Kuhler, J. L. (2024). Computer systems industry. Salem Press Encyclopedia.

Volonino, L. (2024). Computer viruses and worms. Salem Press Encyclopedia of Science.

Comments