Network Security
While researching what attack can be executed using the
Ping command, I found what is called the Ping of Death DDos attack. This is
where the attacker uses overwhelming Ping packets to a network device in
attempt to slow down or crash their device. This is a dangerous yet classic
attack.
Two
security incidents I chose to discuss are Security holes and Phishing. Security
holes are a vulnerability, an aspect of the computer that can be used to breach
security. (as found in Chapter 8.1.2 in Zybooks under Security Holes). And
Phishing which can be found in an email used to bait you in by clicking their
button and can cause computer virus or can be a way of being hacked to steal
money or private information. I formerly had an experience where I was doing schoolwork,
and my computer screen would not let me do anything. Someone hacked the
computer claiming to be Microsoft saying I have a virus, and they would fry my
computer unless I called them. I called and they talked me into $50 claiming I could
access my computer again if I did that, and I was desperate. They hacked my
computer to the point, they stole my private information and stole over $400
from my bank account, they took over my Facebook account and yahoo account as
well. My bank sided with them saying it was my fault for getting hacked. At
that time, I knew nothing about how to stop them from continuously robbing me,
so I asked my cousin to help me. He was able to get the computer back to mode
as if it is new not used so they stopped controlling my computer. I lost
everything on it, but it was worth it to access my computer again and prevent
further issues. Cyber Security is very important, and I highly recommend
everyone have some security even if just the free version of the virus
protection apps. For example, AVG is one that is free unless you upgrade it.
Comments
Post a Comment