Sunday, 28 August 2022

Network Security

 Network Security provides a secure network connection to prevent computer system attacks and unauthorized accesses. A type of attack that can happen if network security was not followed is one that can happen during a ping command. This is called a Denial of Service, where the attacker can crash, destabilize or freeze the computer that executed the command. It does this by sending oversized ping packets. This is can cause very drastic damage especially when the only thing the attacker needs is an IP address. 


Apart from Ping command attacks, other computer system attacks include computer viruses and email spam. Computer viruses are malicious software that can cause damage to computer software (Fortinet, n.d. para 1).  This damages and corrupt files which can spread from onw file to another. Computer viruses can happen over networks, using corrupted flash drives, click a corrupted ad that downloads data and so on. The virus affects the computer by making it slower and cause unexpected crashes. As for Email spam, most email will use a familiar name in hopes to get the user attention so that you can click on and probably find a way get your personal information and use it to their benefit. Therefore, it is important to pay attention to emails you receive and do not open malicious emails. 

Since computer systems are vulnerable to threats it is important to protect your computer and its information by using VPNs and antivirus to prevent threats from occurring or being overlooked. This is because when systems are compromised data loss, theft and damage can occur. This make computers slower, or crash or even unusable. 


References 

Nic

 

Nicol, M. (1997). Managing Information System Security. Macmillan Education UK.

6 Ways to Prevent Cybersecurity Breaches. (n.d.). Tech Support of Minnesota. Retrieved August 22, 2022, from https://techsupportofmn.com/6-ways-to-prevent-cybersecurity-breaches

Stine, K., & Scholl, M. (n.d.). E-mail Security: An Overview of Threats and Safeguards. AHIMA Body of Knowledge. Retrieved August 22, 2022, from https://library.ahima.org/doc?oid=99319#.YwQ0cHbMJD8

What are Computer Viruses? | Definition & Types of Computer Viruses. (n.d.). Fortinet. Retrieved August 22, 2022, from https://www.fortinet.com/resources/cyberglossary/computer-virus

What is Ping of Death (PoD) | DDoS Attack Glossary. (n.d.). Imperva. Retrieved August 22, 2022, from https://www.imperva.com/learn/ddos/ping-of-death/


No comments:

Post a Comment

OS Theory Concept Map

  Week 1 Concept Map     Week 2 Concept Map             Week 3 Concept Map             Week 4 Concep...