Post #6 – Network Security

 


Types of attacks that can be executed through ping commands

As stated in the week 3 Traveling Through a Network forum, ping is a utility used to test the connectivity between two devices over a network. It works by sending an ICMP (Internet Control Message Protocol) Echo request packet to a target device and waiting for an ICMP Echo Reply packet in response. While ping is a useful diagnostic tool, it can also be used in some types of attacks. Here are some examples:

  1. Ping Flood Attack: A ping flood attack is a denial-of-service (DoS) attack in which an attacker sends a large number of ping requests to a target device in a short period of time, overwhelming its network capacity and causing it to become unresponsive.
  2. Ping of Death Attack: A ping of death attack is a DoS attack that involves sending an oversized ICMP packet to a target device, causing it to crash or become unresponsive.
  3. Smurf Attack: A Smurf attack is a type of DoS attack in which an attacker spoofs the source IP address of a ping request and sends it to a broadcast address on a network. This causes all devices on the network to reply to the spoofed IP address, overwhelming the target device with a flood of responses.

It is important to note that many modern network devices are configured to block or limit ICMP traffic, making these types of attacks more difficult to execute. Additionally, these attacks are illegal and can result in severe consequences for the attacker.

Why computer systems are vulnerable to computer viruses?

Computer systems are vulnerable to computer viruses due to their ability to replicate and spread from one system to another. They are designed to infect a system's operating system and other software programs to cause damage. The most common ways computer viruses enter a system are through downloading files, opening email attachments, and visiting infected websites. Computer viruses can exploit vulnerabilities in a system's security protocols and software, and once inside, they can replicate and spread to other systems connected to the network.

Symptoms and damage of a computer virus infection

The symptoms of a computer virus infection may vary depending on the type of virus and its level of sophistication. According to Vahid & Lysecky (2019), The most common way for a virus to spread is via email, where a user is tricked into downloading and running an application that installs a virus (Sec 8.2 Para 2). Some of the common symptoms include system crashes, slow performance, pop-up ads, unauthorized access, and data loss. Once a virus has infected a system, it can cause serious damage such as corrupting or deleting files, stealing sensitive information, and disrupting the entire system's operations.

Recommendations for protecting a computer system or network from computer viruses

  1. Install antivirus software: Antivirus software can detect and remove viruses from a system before they can cause damage. It can also provide real-time protection by scanning files and emails as they are downloaded or opened (What Is a Computer Virus?, n.d.).
  2. Keep software up-to-date: It's essential to keep your operating system and software programs up-to-date with the latest security patches and updates. This helps to protect your system against known vulnerabilities that viruses can exploit.

Why computer systems are vulnerable to phishing attacks?

Computer systems are vulnerable to phishing attacks because they exploit human behavior and social engineering techniques to trick users into disclosing sensitive information. Phishing attacks can take many forms, including email messages, social media posts, and fake websites that mimic legitimate ones. These attacks often appear to come from a trusted source and contain a sense of urgency to prompt the user to act quickly. When users click on links or provide personal information, it can result in a security breach and compromise the entire system.

Symptoms and damage of a phishing attack

The symptoms of a phishing attack may not be immediately apparent. Users may not realize they have fallen victim until it's too late. Once a phishing attack has compromised a system, it can cause serious damage, such as stealing sensitive information, installing malware or ransomware, and giving unauthorized access to cybercriminals (What Is Phishing?, 2023).

Recommendations for protecting a computer system or network from phishing attacks

  1. Educate users about phishing: Educating users on the dangers of phishing and how to spot a phishing attack can help prevent successful attacks. This can include providing regular training and phishing simulations to help users identify phishing attempts.
  2. Implement email filters: Email filters can block suspicious emails and prevent them from reaching users' inboxes. This can include blocking emails from known phishing domains, scanning for suspicious attachments and links, and applying email authentication protocols.

 

 

 

References

Vahid, F., & Lysecky, S. (2019). Computing technology for all. zyBooks.

·         The full-text version of this ebook is available in your online classroom through the zyBooks platform.

What Is A Computer Virus? (n.d.). Norton. https://us.norton.com/blog/malware/what-is-a-computer-virus

What Is Phishing? (2023, February 21). Cisco. https://www.cisco.com/c/en/us/products/security/email-security/what-is-phishing.html

Comments

Popular Posts