Post #6 - Network Security
Network Security
I will discuss computer viruses and phishing attacks, why computers
are vulnerable to these threats, the damage they can do, and some suggestions
for better protecting a computer system. Computer Viruses are programs that
“infect” a computer system and often spread to other connected computers
(Vahid, F., & Lysecky, S., 2019, Sec. 8.2). Once a computer is infected,
the computer is at the mercy of the virus, which can either control the
computer to does, such as illegal activities, steal personal information from
the computers users, or even delete data from the computer system (Vahid, F.,
& Lysecky, S., 2019, Sec. 8.2).
Phishing attacks happen through methods in which
“sensitive information like password(s) or credit card number(s)” are stolen
through means where an individual “baits” users to share their personal
information by sending illegitimate emails in the hope that the user will
either click a link that will infect the computer system, or trick them into
giving out their personal information with enticing offers or threats from what
appears to be legitimate companies (Vahid, F., & Lysecky, S., 2019, Sec.
8.5).
The damage these attacks from these attacks can
range anywhere from a small leak to needing to wipe a computer system
completely. For computer viruses, the goal of each virus may be different;
While some viruses may utilize the infected computer to send spam to other
computers to infect more systems, others may steal all personal data from a
computer and render the system useless (Vahid, F., & Lysecky, S., 2019,
Sec. 8.2).
Phishing attacks often are aimed more at stealing
personnel, such as the 2016 Russian election incident where “12 Russian
military intelligence officers” were arrested for “their alleged roles in
interfering with the 2016 United States (U.S.) elections” (FBI, n.d.). The
intelligence offices launched a series of “spear phishing” attacks against the
“volunteers and employees of the Hillary Clinton presidential campaign and were
able to access “usernames and passwords” to “steal email content and hack into
other computers” (U.S Department of Justice, 2018).
Conclusion
In conclusion, protection against such attacks is possible through
antivirus software and software designed to aid in filtering spam or phishing
emails. Still, the best defense against such attacks is to be aware of the
methods being used to approach suspicious emails, websites, or links on social
media with a small amount of caution and to always double-check with any
companies that you exchange information of money, to ensure that you are not
being taken advantage of.
References
Federal
Bureau of Investigation. (n.d). RUSSIAN INTERFERENCE IN 2016 U.S. ELECTIONS. https://www.fbi.gov/wanted/cyber/russian-interference-in-2016-u-s-elections
U.S.
Department of Justice. (2018, July 13). Grand Jury Indicts 12 Russian
Intelligence Officers for Hacking Offenses Related to the 2016 Election. Office
of Public Affairs. https://www.justice.gov/opa/pr/grand-jury-indicts-12-russian-intelligence-officers-hacking-offenses-related-2016-election
Vahid,
F., & Lysecky, S. (2019). Computing technology for all. zyBooks.
Comments
Post a Comment