Network Security

 

  While researching what attack can be executed using the Ping command, I found what is called the Ping of Death DDos attack. This is where the attacker uses overwhelming Ping packets to a network device in attempt to slow down or crash their device. This is a dangerous yet classic attack.

            Two security incidents I chose to discuss are Security holes and Phishing. Security holes are a vulnerability, an aspect of the computer that can be used to breach security. (as found in Chapter 8.1.2 in Zybooks under Security Holes). And Phishing which can be found in an email used to bait you in by clicking their button and can cause computer virus or can be a way of being hacked to steal money or private information. I formerly had an experience where I was doing schoolwork, and my computer screen would not let me do anything. Someone hacked the computer claiming to be Microsoft saying I have a virus, and they would fry my computer unless I called them. I called and they talked me into $50 claiming I could access my computer again if I did that, and I was desperate. They hacked my computer to the point, they stole my private information and stole over $400 from my bank account, they took over my Facebook account and yahoo account as well. My bank sided with them saying it was my fault for getting hacked. At that time, I knew nothing about how to stop them from continuously robbing me, so I asked my cousin to help me. He was able to get the computer back to mode as if it is new not used so they stopped controlling my computer. I lost everything on it, but it was worth it to access my computer again and prevent further issues. Cyber Security is very important, and I highly recommend everyone have some security even if just the free version of the virus protection apps. For example, AVG is one that is free unless you upgrade it.



Comments

Popular Posts