The Network Security paper
The Importance of Information and System Security for
Individuals and Organizations.
Introduction
In a world where nearly everything is digital, ensuring our
information and system security is safe has become paramount for both
individuals and organizations. A breach in security can lead to theft of
sensitive data, financial loss, and cause irreparable damage to an
organizations reputation as well as an individuals life. As technology
continues to evolve and cyber threats become more sophisticated, understanding
vulnerabilities associated with computer systems and the various types of
security incidents is crucial for safety and security of both personal and
professional organizational information.
Malware and Ransomware
Malware is short for “malicious software”. It refers to a
variety of harmful software made to
damage, disrupt, and/or gain unauthorized access to computer systems and
networks. “Virus, Trojan
horses, worms and
spyware are the various types of malware along with a few others. 2. Ransomware : Ransomware is a type of
malware that is designed to block user access from own system until a ransom
fee is paid to ransomware creator.” (Geeksforgeeks, 2020) Ransomware can attack
individuals or organizations, it is also more harmful than other malware.
Ransomware is a specific type of malware that can encrypt files on a victim’s
device, making them inaccessible until a ransom is paid to the attacker.
Computer systems are vulnerable to malware and ransomware, due to a variety of
factors, including user negligence (such as accidentally clicking on malicious
links or downloading questionable attachments), outdated security systems, and
unpatched systems
Symptoms and Damage
Many users may inadvertently download malicious software
through phishing emails or compromised websites. Also, inadequate updating of
your computer systems can create entry points for cyber criminals. When a
system is compromised by ransomware, a user may notice immediately symptoms
like the appearance of a ransom note demanding payment or file encryption,
which you would notice through changed file extensions, or a noticeable
slowdown in system performance. Crypto ransomware encrypts files and demands
payments for the encryption key, whereas locker ransomware locks users out of
their systems entirely, demanding a ransom to regain access. Such attacks often
lead to significant financial losses, and organizations could be forced to pay
the ransom or deal with the loss of vital data. It can also lead to operational
time being down for a period of time, loss of customer trust, and potentially
long-lasting damage to a company’s reputation.
Prevention and Protection
The best protection is educating yourself and being aware of
malware and ransomware. Organizations as well as individuals should implement a
trustworthy data backup strategy that includes automatic and secure backups to
offsite locations. This will make sure that files can be restored in the event
of a ransomware attack without having to pay the ransom or lose any data or
experience operational downtime. Having regular training sessions to educate
employees on how to recognize phishing attempts and malware threats. When a
user knows how to identify suspicious emails and links can reduce the risk of
accidentally downloading malware.
Phishing and Smishing
Phishing is an automated form of social engineering, where
cyber criminals use the internet to fraudulently obtain individuals and
businesses information, usually by impersonating a real legitimate website, but
is really a fake website that will steal your information. A typical phishing attack begins with an
e-mail to the victim, supposedly from a reputable institution, yet actually
from the phisher. The text of the message commonly warns the user that a
problem must be immediately corrected with the user’s account. The victim is
then led to a spoofed website (a fake one designed to resemble the
institution’s official website) (Alsharnouby et al., 2015).(Tehrani &
Pontell, 2021)
Computer systems are vulnerable to phishing attacks due to
human errors, lack of user awareness, and the sophistication of modern phishing
and smishing attacks.
Smishing is short for “SMS phishing;” SMS is “short message
service,” the standard the world uses for text messaging (Stembert et al.,
2015). Smishing attacks utilize phone text messages and they attack the victim,
instead of e-mails, partially to bypass SPAM filters and to reach more
potential victims. (Tehrani & Pontell, 2021)
Symptoms and Damage
Symptoms of a successful phishing attack may include
unauthorized transactions on accounts, changes to personal information, or
signs of identity theft. The damage from phishing can be severe, leading to
compromised data and financial loss. As for organizations, a successful attempt
can result in major security breaches, exposing sensitive consumer information
and possibly incur regulatory fines.
Prevention and Protection Recommendations
Multi-factor authentication adds an essential layer of
security by requiring users to verify their identity through several means.
This can definitely reduce the likelihood of unauthorized access.
Employing advanced email filtering technologies can help
detect and block phishing messages before they reach the users inbox. This
approach can reduce the number of successful phishing attempts within an
organization.
Conclusion
To summarize, the security landscape for both individuals
and companies is definitely filled with challenges by malware, ransomware,
phishing and smishing attacks. Understanding the vulnerabilities in computer
systems is crucial for implementing effective defensive strategies, such as
education, awareness, data backups, and multi-factor authentication, in order
to prevent and protect ourselves from associated security threats.
References
TestOut
Corp. (2024). CertMaster Learn Tech+. http://www.testout.com
Geeks for Geeks, (2020) Difference between Malware and
Ransomware | Difference
between Malware and Ransomware - GeeksforGeeks
Ghazi-Tehrani & Pontell (2021) Phishing Evolves:
Analyzing the Enduring Cybercrime, Victims & Offenders, 16:3, 316-342, DOI:
10.1080/15564886.2020.1829224 | https://doi.org/10.1080/15564886.2020.1829224
Comments
Post a Comment