Skip to main content

Network Security: Malware and Steps to Avoid Technology Attacks!




 Types of Technology Attacks and Their Destructive Intentions

Security is a critical topic when discussing the ever-increasing technology of today. Consider, for instance, the abuse of a ping command. Known colloquially as a Ping of Death (POD) or Ping Flooding, these attacks send large packets of information that aim to prevent the server from operating correctly; this type of attack is classified as a DoS or Denial of Service attack (Imperva, n.d., para. 1). Phishing is another type of security breach in which a user receives a link via email or messaging services. The link leads the user to a page that attempts to install malware to freeze the system or gain access to sensitive information, such as payment information, banking information, or theft of funds or identity (Imperva, n.d., para. 1-2). A ransomware attack is another form of phishing, allowing the attacker to stop a system from working correctly. The attacker demands payment to enable the user to get their files back (Imperva, n.d., para. 1). Phishing can also trick a user into entering a password, becoming part of a broader category of computer security threats called password cracking. Some other forms of password cracking are the man in the middle (MitM), where someone intercepts information while two systems send data back and forth (Onelogin, n.d.). A brute force attack includes using a program to enter billions or trillions of passwords in a concise amount of time, and if a password is simple enough, it will be detected (Onelogin, n.d.). Keylogging is another type of password hacking that involves the attacker having planted malware on the user’s device, which tracks keystrokes and eventually leads to the user’s password or passwords (Onelogin, n.d.).

The Reason for the Existence of Computer Vulnerability

Computer systems vulnerability exists for multiple reasons. First is human error. As seen with phishing attacks, the computer becomes vulnerable as the user allows the system to be overtaken or exploited (Kelley, 2023, para. 14). Complex systems can increase vulnerability due to the vast array of scenarios that are not accounted for when programming, this includes bugs that are not caught by the programmer when running the program. The amount of connectivity leads to vulnerabilities, too, due to the increased access points an attacker can try to exploit (Kelley, 2023, para. 16). 

Precautions for Avoiding Computer Attacks

Mainstream OS like Windows and Mac OS X are constantly combing through their code to improve security. The improvements come from adding new code and modifying existing code. Therefore, ensuring that a computer is updated when security features are rolled out helps to avoid computer attacks. Additionally, many reputable aftermarket anti-virus software packages exist. An antivirus program removes viruses and other malicious software known as malware from the computer; the program usually updates itself to accommodate both old and new attacks that attackers try to develop (NCSC, 2019, para. 4). “Once it's on your computer or laptop, malware can steal your data, encrypt it so you can't access it, or even erase it completely. For this reason, it's important that you always use antivirus software and keep it up to date to protect your data and devices” (NCSC, 2019, para. 3). The production, protection, and maintenance of passwords are important too. “Signing out regularly, changing passwords frequently, never writing a password (in a file, email, or paper), using different passwords for different sites, and using hard-to-guess passwords can improve account security. If a user must write something, a user might write a hint to help remember the password. Good passwords typically are not words in the dictionary and may mix letters, numbers, and special characters like !, @, $, and %” (Vahid & Lysecky, 2019, Section 8.4, para. 2).

References

Imperva. (n.d.). Ping of death. https://www.imperva.com/learn/ddos/ping-of-death/

Imperva. (n.d.). Phishing attacks. https://www.imperva.com/learn/application-security/phishing-attack-scam/

Kelley, K. (2023, February 20). Vulnerability in security: a complete overview. Simplilearn. https://www.simplilearn.com/vulnerability-in-security-article#:~:text=Human%20error%20%E2%80%93%20When%20end%20users,causes%20of%20vulnerabilities%20in%20security.

NCSC. (2019, January 21). What is an antivirus product? Do I need one? National Cyber Security Centre (UK). https://www.ncsc.gov.uk/guidance/what-is-an-antivirus-product#:~:text=Once%20it's%20on%20your%20computer,protect%20your%20data%20and%20devices.

Onelogin. (n.d.) Six types of password attacks & how to stop them. One Identity. https://www.onelogin.com/learn/6-types-password-attacks

Vahid, F., & Lysecky, S. (2019). Computing technology for all. zyBooks.


Comments

Popular posts from this blog

Information Technology and Technology Literacy

  IT and Its Relation to Technology Literacy and Technology History Information Technology is a career field centered around technology literacy. IT involves computer hardware, software, programming, architecture, security, database, developers, network and system administration, and IT leadership (Aha!, n.d.). “Information Technology refers to the management and use of information using computer-based tools. It refers to both hardware and software. Mostly, it is the term used to refer to business applications of computer technology rather than scientific applications” (Mathew & Murugeshon, 2013, p. 15, para. 1). The need for IT could be said to have started in the 1990’s “The information age just began in the 1990's, with human activity shifting from traditional industry to creating/managing/using computerized information” (Vahid & Lysecky, 2019, Section 1.1, Para. 3). Considering that IT has fields that manage data such as a Big Data Engineer (a type of data considered to...

Using the Scratch Programming Language

  The Scratch Language Programming Experience Scratch is a building block for beginner programmers. It is considered a visual programming language and helps the programmer learn to use conditional logic, systematic reasoning, and program creativity (Integrating Computing, n.d., p. 1, para. 1). I created an interactive program that allows the user to manipulate multiple sprites simultaneously by using various inputs from the keyboard. The outcome was to enable the user to make a set of three cats appear to dance. Once I got used to the language, I had fun with it. Difficulties, Solutions, and Insight Gained from Using Scratch Learning any new language or platform is easier once the general idea of the layout is understood. Once I understood the layout of the IDE, the next difficulty was testing to see how connecting blocks, clicking on blocks, and editing blocks affected the sprites. There were some functions I would have to view the tutorials for, such as the if-then statements. Th...

The Necessity for Computer Literacy in the Workplace

The Functions of Computers in Manufacturing and My Personal Experience With Them. I have worked in the manufacturing industry for 18 years. For ten years, I compression molded fiber-reinforced thermoset polymers (fiberglass matting and thick liquid resin mixed with colors and other chemicals, then pressed them into shapes at high temps to cause the liquid resin to cure and harden). Then I switched to the CNC industry, where I found automation and was fascinated by the potential of some of the devices. Many of the devices that make automation possible are unique and have unique types of Operating Systems and IDEs that make implementation difficulty range from easy to moderate. We rely on Microsoft Windows-based products for PCs with a more common OS. A prominent program that we use on PC is called Plex. Plex allows information to be transferred around at all the computer stations, both plant-wide and from locations outside the plant. However, access from outside the plant is only grante...