Post #6 - Network Security

 Network Security

 I will discuss computer viruses and phishing attacks, why computers are vulnerable to these threats, the damage they can do, and some suggestions for better protecting a computer system. Computer Viruses are programs that “infect” a computer system and often spread to other connected computers (Vahid, F., & Lysecky, S., 2019, Sec. 8.2). Once a computer is infected, the computer is at the mercy of the virus, which can either control the computer to does, such as illegal activities, steal personal information from the computers users, or even delete data from the computer system (Vahid, F., & Lysecky, S., 2019, Sec. 8.2).

 

Phishing attacks happen through methods in which “sensitive information like password(s) or credit card number(s)” are stolen through means where an individual “baits” users to share their personal information by sending illegitimate emails in the hope that the user will either click a link that will infect the computer system, or trick them into giving out their personal information with enticing offers or threats from what appears to be legitimate companies (Vahid, F., & Lysecky, S., 2019, Sec. 8.5).

 

The damage these attacks from these attacks can range anywhere from a small leak to needing to wipe a computer system completely. For computer viruses, the goal of each virus may be different; While some viruses may utilize the infected computer to send spam to other computers to infect more systems, others may steal all personal data from a computer and render the system useless (Vahid, F., & Lysecky, S., 2019, Sec. 8.2).

 

Phishing attacks often are aimed more at stealing personnel, such as the 2016 Russian election incident where “12 Russian military intelligence officers” were arrested for “their alleged roles in interfering with the 2016 United States (U.S.) elections” (FBI, n.d.). The intelligence offices launched a series of “spear phishing” attacks against the “volunteers and employees of the Hillary Clinton presidential campaign and were able to access “usernames and passwords” to “steal email content and hack into other computers” (U.S Department of Justice, 2018).

Conclusion

In conclusion, protection against such attacks is possible through antivirus software and software designed to aid in filtering spam or phishing emails. Still, the best defense against such attacks is to be aware of the methods being used to approach suspicious emails, websites, or links on social media with a small amount of caution and to always double-check with any companies that you exchange information of money, to ensure that you are not being taken advantage of.

 


 

References

Federal Bureau of Investigation. (n.d). RUSSIAN INTERFERENCE IN 2016 U.S. ELECTIONS. https://www.fbi.gov/wanted/cyber/russian-interference-in-2016-u-s-elections

U.S. Department of Justice. (2018, July 13). Grand Jury Indicts 12 Russian Intelligence Officers for Hacking Offenses Related to the 2016 Election. Office of Public Affairs. https://www.justice.gov/opa/pr/grand-jury-indicts-12-russian-intelligence-officers-hacking-offenses-related-2016-election

Vahid, F., & Lysecky, S. (2019). Computing technology for all. zyBooks.

Comments

Popular posts from this blog

Post #1 - Programming Languages

Post #7 Tech Topic Connection