Types of Technology Attacks and Their Destructive Intentions
Security is a critical topic when discussing the ever-increasing technology of today. Consider, for instance, the abuse of a ping command. Known colloquially as a Ping of Death (POD) or Ping Flooding, these attacks send large packets of information that aim to prevent the server from operating correctly; this type of attack is classified as a DoS or Denial of Service attack (Imperva, n.d., para. 1). Phishing is another type of security breach in which a user receives a link via email or messaging services. The link leads the user to a page that attempts to install malware to freeze the system or gain access to sensitive information, such as payment information, banking information, or theft of funds or identity (Imperva, n.d., para. 1-2). A ransomware attack is another form of phishing, allowing the attacker to stop a system from working correctly. The attacker demands payment to enable the user to get their files back (Imperva, n.d., para. 1). Phishing can also trick a user into entering a password, becoming part of a broader category of computer security threats called password cracking. Some other forms of password cracking are the man in the middle (MitM), where someone intercepts information while two systems send data back and forth (Onelogin, n.d.). A brute force attack includes using a program to enter billions or trillions of passwords in a concise amount of time, and if a password is simple enough, it will be detected (Onelogin, n.d.). Keylogging is another type of password hacking that involves the attacker having planted malware on the user’s device, which tracks keystrokes and eventually leads to the user’s password or passwords (Onelogin, n.d.).
The Reason for the Existence of Computer Vulnerability
Computer systems vulnerability exists for multiple reasons. First is human error. As seen with phishing attacks, the computer becomes vulnerable as the user allows the system to be overtaken or exploited (Kelley, 2023, para. 14). Complex systems can increase vulnerability due to the vast array of scenarios that are not accounted for when programming, this includes bugs that are not caught by the programmer when running the program. The amount of connectivity leads to vulnerabilities, too, due to the increased access points an attacker can try to exploit (Kelley, 2023, para. 16).
Precautions for Avoiding Computer Attacks
Mainstream OS like Windows and Mac OS X are constantly combing through their code to improve security. The improvements come from adding new code and modifying existing code. Therefore, ensuring that a computer is updated when security features are rolled out helps to avoid computer attacks. Additionally, many reputable aftermarket anti-virus software packages exist. An antivirus program removes viruses and other malicious software known as malware from the computer; the program usually updates itself to accommodate both old and new attacks that attackers try to develop (NCSC, 2019, para. 4). “Once it's on your computer or laptop, malware can steal your data, encrypt it so you can't access it, or even erase it completely. For this reason, it's important that you always use antivirus software and keep it up to date to protect your data and devices” (NCSC, 2019, para. 3). The production, protection, and maintenance of passwords are important too. “Signing out regularly, changing passwords frequently, never writing a password (in a file, email, or paper), using different passwords for different sites, and using hard-to-guess passwords can improve account security. If a user must write something, a user might write a hint to help remember the password. Good passwords typically are not words in the dictionary and may mix letters, numbers, and special characters like !, @, $, and %” (Vahid & Lysecky, 2019, Section 8.4, para. 2).
References
Imperva. (n.d.). Ping of death. https://www.imperva.com/learn/ddos/ping-of-death/
Imperva. (n.d.). Phishing attacks. https://www.imperva.com/learn/application-security/phishing-attack-scam/
Kelley, K. (2023, February 20). Vulnerability in
security: a complete overview. Simplilearn. https://www.simplilearn.com/vulnerability-in-security-article#:~:text=Human%20error%20%E2%80%93%20When%20end%20users,causes%20of%20vulnerabilities%20in%20security.
NCSC. (2019, January 21). What is an antivirus product?
Do I need one? National Cyber Security Centre (UK).
https://www.ncsc.gov.uk/guidance/what-is-an-antivirus-product#:~:text=Once%20it's%20on%20your%20computer,protect%20your%20data%20and%20devices.
Onelogin. (n.d.) Six types of password attacks & how
to stop them. One Identity. https://www.onelogin.com/learn/6-types-password-attacks
Vahid,
F., & Lysecky, S. (2019). Computing technology for all.
zyBooks.

Comments
Post a Comment