Introduction
    In the digital age, information and system security play a crucial role in safeguarding individuals and organizations from various cyber threats. This paper aims to explain the significance of information and system security and delve into specific types of cyber threats, including those associated with ping commands in networking.
Ping Command Attacks
    Ping commands, commonly used for network diagnostics, can be exploited for malicious purposes. One type of attack facilitated by ping commands is the Ping of Death. This attack involves sending an oversized packet to a target system, causing it to crash or become unresponsive. Additionally, attackers may execute a Distributed Denial of Service (DDoS) attack by flooding a target’s IP address with pings, clogging up their bandwidth and potentially causing the ISP to temporarily cut off their internet access in order to 
Computer Security Incidents
Computer viruses are malicious programs used by bad actors to damage or gain illicit access to another’s computer. Computer viruses can be used to steal personal details from infected computers, propagate itself across networks, delete valuable data, or lock the owner out of their system entirely. In 2004, the Mydoom worm (a virus that can run independently of any other programs) caused an estimated $38 billion dollars of damage by infecting millions of computers. The virus spread through infected emails by scanning infected machines for email address books, then sending copies of itself to those addresses. Additionally, the virus hijacks the computer itself to work with other infected machines in what is known as a “botnet” to execute DDoS attacks against various websites and servers. Even today, Mydoom is propagating at the rate of 1.2 billion infected computers a year despite the leaps and bounds made in network security (Gerencer, 2020). To protect against viruses, it’s vitally important to install a reputable antivirus program and ensure that it’s kept up to date with the latest definitions. Keeping the Operating System (OS), as well as all drivers, programs, and apps up to date will help protect against unauthorized access.
    Another type of security incident worth mentioning is called Phishing. Phishing exploits human trust by tricking individuals into revealing sensitive information through deceptive emails or websites by impersonating trustworthy people or organizations. If you’ve ever noticed a suspicious friend request from an obviously fake profile pretending to be one of your family members, you’ve been targeted by a phishing scam. Phishing can lead to identity theft, financial loss, and unauthorized access to personal or organizational data. The best way to protect against these kinds of social engineering attacks is to learn how to recognize them, since they rely on deception to exploit their targets. Look out for claims of suspicious activity or problems with your account that requires you to follow a link (FTC, 2022). Look for generic greetings, urgent calls to action, links to external websites, or an email address that doesn’t originate from the company the sender claims to be representing; Amazon does not use Gmail to communicate with its customers. To protect against malicious links, always type the URL of the legitimate website an email attempts to link you to if you feel the need to verify your account status to avoid falling prey to malicious links. Finally, never open attachments in suspicious emails, as they may contain a virus.
Conclusion
    Understanding the vulnerabilities associated with ping commands and common computer security incidents is essential for developing robust security measures. By implementing these strategies, individuals and organizations can significantly enhance their resistance to cyber threats, thereby safeguarding their information and systems in an ever-evolving digital landscape.
 
References
Federal Trade Commission. (2022, September). How to Recognize and Avoid Phishing Scams. Federal Trade Commission Consumer Advice. https://consumer.ftc.gov/articles/how-recognize-and-avoid-phishing-scams. 
Gerencer, T. (2020, November 04). The Top 10 Worst Computer Viruses in History. HP Tech Takes. https://www.hp.com/us-en/shop/tech-takes/top-ten-worst-computer-viruses-in-history.
No comments:
Post a Comment