Thursday, May 20, 2021

Network Security

 Security information and systems is very important for individuals and companies since a lot of important information is stored online and there will always be someone trying to hack through systems and computers to steal this information. This may cause a lot of money being stolen and even identities stolen. Ping commands can be used to steal information because it shows the IP addresses the websites are using. This can lead to the website being hacked. Password hacking can be an easy thing to do if you make your passwords easy with birthdates and names of things instead of just using symbols which will make it harder to hack. Also email spam can do really bad damage if you download a file that can be a virus or spyware that can go through all your stored information on the computer without the user even knowing. When I did the ping command exercise I realized that it can make a hacker be able to hack websites easier because it gives the information what IP addresses the website is coming for to get to the computer the user is on. The thing is if they select the information on the server to be private you won't see the IP address it’s coming from and it makes it a little safer not saying all the way safe. Computer systems are vulnerable to passwords being hacked because a lot of people make easy passwords or write them down using multiple passwords that are the same for multiple devices, applications, and websites. The damage it can cause can be from just stealing your card information to stealing your whole identification. They can also get information like private photos, files, and videos. So it really is important to make sure to use a lot of symbols in your passwords or there is three-factor authentication. “To pass the authentication, the user must input a password and provide a pass code generated by the token (e.g., RSA SecureID), and scan The Network Security Paper 3 her biometric features (e.g., fingerprint or pupil). Three-factor authentication is a comprehensive defense mechanism against password stealing attacks, but it requires comparative high cost”(Kumari,2013). Use sites that have this to make sure your information is more secure. Also make your passwords have more symbols and don’t reuse the same passwords. Computer systems are vulnerable to email spam because they can have files with virus and spyware on them. It could be a long time before it's realized it's there until your computer doesn't work anymore with a virus. The spyware you won't even know it’s on there as it goes all through your computers files and looking at information. Over time there are more and more computer threats like viruses and spyware.”Many malware attacks use emails (e.g. Melissa, Love Bug); some others use self-propagating programs called (e.g. Code Red) and yet others use a combination of these two techniques (e.g. Nimda). In spite of developing more advanced antivirus software, new malware routinely get released over the Internet and continue to cause lost machine cycles and man hours”(Data,2005). The damage this can cause is that your computer runs slower, starts to run by it self, stops working completely, and your information thats personal getting out to people you don't know. To protect better not fully protect it but it’s better to have it is a computer program called anti virus software. “Antivirus software is a program that looks for known viruses and strives to disable found viruses, by searching a hard drive, and/or by monitoring visited websites and downloaded files. Some company websites, like drive.google.com, check for viruses on the server before providing a file for download”(Vahid,2017). Another one is to be cautious and to not click links or download files from emails you don’t know because it could be a threat. It’s better to be this way because nothing fully protects your computer from online threats. 

References 

Kumari, C. S., & Rani, M. D. (2013). Hacking resistance protocol for securing passwords using

personal device. 2013 7th International Conference on Intelligent Systems and Control

(ISCO), Intelligent Systems and Control (ISCO), 2013 7th International Conference On,

458–463. https://doi-org.proxy-library.ashford.edu/10.1109/ISCO.2013.6481198


Data, S., & Hui Wang. (2005). The effectiveness of vaccinations on the spread of email-borne

computer viruses. Canadian Conference on Electrical and Computer Engineering, 2005.,

Electrical and Computer Engineering, 2005. Canadian Conference on, Electrical and

Computer Engineering, 219–223.

https://doi-org.proxy-library.ashford.edu/10.1109/CCECE.2005.1556914


Vahid, F., & Lysecky, S. (2017). Computing technology for all. Retrieved from

zybooks.zyante.com/

No comments:

Post a Comment

Search This Blog

Followers

Contact Form

Name

Email *

Message *

Algorithms and Data Structures

                      How to apply algorithmic design and data structure techniques in developing structured programs is solved by finding w...