Network security is an essential factor for both home and business networks. Security measures are needed to protect user information and not be vulnerable to bad online actors. Unfortunately, some individuals purposefully steal user information or infect devices with viruses and malware, which can be costly to repair. Most people are familiar with password protection as a form of network security. However, passwords are only the beginning of securing a network. Other forms of network protection may include firewalls, encryption, antivirus software, VPNs (virtual private networks), and two-factor authentication, which has become more popular over the last few years.
Many different methods can be used to test the health of a network. When a network is running slower than it should, one can use a ping command to see if there is an issue related to packet loss as it travels to a specific destination. However, bad actors can also use ping commands to wreak havoc on a home or business network intentionally. A PoD (Ping of Death) attack “is a type of Denial of Service (DoS) attack in which an attacker attempts to crash, destabilize, or freeze the targeted computer or service by sending malformed or oversized packets using a simple ping command” (Imperva, n.d.). Packets sent in such an attack are large enough to overwhelm the destination device. However, implementing the proper network security measures prevents such attacks before they start.
Another widespread network security threat is email spam. “Spam is unsolicited mass email, perhaps advertising prescription drugs for sale, or further spreading the virus” (Vahid & Lysecky, 2019). Spam can be a nuisance by overpopulating one’s email box with useless and unwanted information. Another threat that goes hand and hand with spam is phishing. Phishing is a “technique for attempting to acquire sensitive data, such as bank account numbers, through a fraudulent solicitation in email or on a web site, in which the perpetrator masquerades as a legitimate business or reputable person” (NIST, 2015). It is critical to pay close attention to websites one visits and links received from both known and unknown parties. It is common to receive viruses via emails from a known contact. If a friend or family member unknowingly clicks on a link from a bad actor, everyone in their contact list can fall prey to malicious activity. When in doubt regarding suspicious information, the best action is no action, just delete. It is better to be safe with your information secure than sorry trying to restore essential data.
References:
Imperva. (n.d.). What is
Ping of Death (PoD) | DDoS Attack Glossary | Imperva. Learning Center. https://www.imperva.com/learn/ddos/ping-of-death/
NIST. (2015). phishing - Glossary | CSRC. Nist.gov. https://csrc.nist.gov/glossary/term/phishing
Vahid, F., & Lysecky, S. (2019). Computing technology for all. zyBooks
No comments:
Post a Comment