Security information and systems is very important for individuals and companies since a
lot of important information is stored online and there will always be someone trying to hack
through systems and computers to steal this information. This may cause a lot of money being
stolen and even identities stolen. Ping commands can be used to steal information because it
shows the IP addresses the websites are using. This can lead to the website being hacked.
Password hacking can be an easy thing to do if you make your passwords easy with birthdates
and names of things instead of just using symbols which will make it harder to hack. Also email
spam can do really bad damage if you download a file that can be a virus or spyware that can go
through all your stored information on the computer without the user even knowing.
When I did the ping command exercise I realized that it can make a hacker be able to
hack websites easier because it gives the information what IP addresses the website is coming for
to get to the computer the user is on. The thing is if they select the information on the server to
be private you won't see the IP address it’s coming from and it makes it a little safer not saying
all the way safe.
Computer systems are vulnerable to passwords being hacked because a lot of people
make easy passwords or write them down using multiple passwords that are the same for
multiple devices, applications, and websites. The damage it can cause can be from just stealing
your card information to stealing your whole identification. They can also get information like
private photos, files, and videos. So it really is important to make sure to use a lot of symbols in
your passwords or there is three-factor authentication. “To pass the authentication, the user must
input a password and provide a pass code generated by the token (e.g., RSA SecureID), and scan
The Network Security Paper 3
her biometric features (e.g., fingerprint or pupil). Three-factor authentication is a comprehensive
defense mechanism against password stealing attacks, but it requires comparative high
cost”(Kumari,2013). Use sites that have this to make sure your information is more secure. Also
make your passwords have more symbols and don’t reuse the same passwords.
Computer systems are vulnerable to email spam because they can have files with virus
and spyware on them. It could be a long time before it's realized it's there until your computer
doesn't work anymore with a virus. The spyware you won't even know it’s on there as it goes all
through your computers files and looking at information. Over time there are more and more
computer threats like viruses and spyware.”Many malware attacks use emails (e.g. Melissa, Love
Bug); some others use self-propagating programs called (e.g. Code Red) and yet others use a
combination of these two techniques (e.g. Nimda). In spite of developing more advanced
antivirus software, new malware routinely get released over the Internet and continue to cause
lost machine cycles and man hours”(Data,2005). The damage this can cause is that your
computer runs slower, starts to run by it self, stops working completely, and your information
thats personal getting out to people you don't know. To protect better not fully protect it but it’s
better to have it is a computer program called anti virus software. “Antivirus software is a
program that looks for known viruses and strives to disable found viruses, by searching a hard
drive, and/or by monitoring visited websites and downloaded files. Some company websites, like
drive.google.com, check for viruses on the server before providing a file for
download”(Vahid,2017). Another one is to be cautious and to not click links or download files
from emails you don’t know because it could be a threat. It’s better to be this way because
nothing fully protects your computer from online threats.
References
Kumari, C. S., & Rani, M. D. (2013). Hacking resistance protocol for securing passwords using
personal device. 2013 7th International Conference on Intelligent Systems and Control
(ISCO), Intelligent Systems and Control (ISCO), 2013 7th International Conference On,
458–463. https://doi-org.proxy-library.ashford.edu/10.1109/ISCO.2013.6481198
Data, S., & Hui Wang. (2005). The effectiveness of vaccinations on the spread of email-borne
computer viruses. Canadian Conference on Electrical and Computer Engineering, 2005.,
Electrical and Computer Engineering, 2005. Canadian Conference on, Electrical and
Computer Engineering, 219–223.
https://doi-org.proxy-library.ashford.edu/10.1109/CCECE.2005.1556914
Vahid, F., & Lysecky, S. (2017). Computing technology for all. Retrieved from
zybooks.zyante.com/