Network Security

 

 

 

 


 

 

 

 

 

 


 

The Network Security paper

The Importance of Information and System Security for Individuals and Organizations.

Introduction

In a world where nearly everything is digital, ensuring our information and system security is safe has become paramount for both individuals and organizations. A breach in security can lead to theft of sensitive data, financial loss, and cause irreparable damage to an organizations reputation as well as an individuals life. As technology continues to evolve and cyber threats become more sophisticated, understanding vulnerabilities associated with computer systems and the various types of security incidents is crucial for safety and security of both personal and professional organizational information.

Malware and Ransomware

Malware is short for “malicious software”. It refers to a variety of  harmful software made to damage, disrupt, and/or gain unauthorized access to computer systems and networks. “VirusTrojan horsesworms and spyware are the various types of malware along with a few others. 2. Ransomware : Ransomware is a type of malware that is designed to block user access from own system until a ransom fee is paid to ransomware creator.” (Geeksforgeeks, 2020) Ransomware can attack individuals or organizations, it is also more harmful than other malware. Ransomware is a specific type of malware that can encrypt files on a victim’s device, making them inaccessible until a ransom is paid to the attacker. Computer systems are vulnerable to malware and ransomware, due to a variety of factors, including user negligence (such as accidentally clicking on malicious links or downloading questionable attachments), outdated security systems, and unpatched systems

Symptoms and Damage

Many users may inadvertently download malicious software through phishing emails or compromised websites. Also, inadequate updating of your computer systems can create entry points for cyber criminals. When a system is compromised by ransomware, a user may notice immediately symptoms like the appearance of a ransom note demanding payment or file encryption, which you would notice through changed file extensions, or a noticeable slowdown in system performance. Crypto ransomware encrypts files and demands payments for the encryption key, whereas locker ransomware locks users out of their systems entirely, demanding a ransom to regain access. Such attacks often lead to significant financial losses, and organizations could be forced to pay the ransom or deal with the loss of vital data. It can also lead to operational time being down for a period of time, loss of customer trust, and potentially long-lasting damage to a company’s reputation.

Prevention and Protection

The best protection is educating yourself and being aware of malware and ransomware. Organizations as well as individuals should implement a trustworthy data backup strategy that includes automatic and secure backups to offsite locations. This will make sure that files can be restored in the event of a ransomware attack without having to pay the ransom or lose any data or experience operational downtime. Having regular training sessions to educate employees on how to recognize phishing attempts and malware threats. When a user knows how to identify suspicious emails and links can reduce the risk of accidentally downloading malware.

Phishing and Smishing

Phishing is an automated form of social engineering, where cyber criminals use the internet to fraudulently obtain individuals and businesses information, usually by impersonating a real legitimate website, but is really a fake website that will steal your information.  A typical phishing attack begins with an e-mail to the victim, supposedly from a reputable institution, yet actually from the phisher. The text of the message commonly warns the user that a problem must be immediately corrected with the user’s account. The victim is then led to a spoofed website (a fake one designed to resemble the institution’s official website) (Alsharnouby et al., 2015).(Tehrani & Pontell, 2021)

Computer systems are vulnerable to phishing attacks due to human errors, lack of user awareness, and the sophistication of modern phishing and smishing attacks.

Smishing is short for “SMS phishing;” SMS is “short message service,” the standard the world uses for text messaging (Stembert et al., 2015). Smishing attacks utilize phone text messages and they attack the victim, instead of e-mails, partially to bypass SPAM filters and to reach more potential victims. (Tehrani & Pontell, 2021)

Symptoms and Damage

Symptoms of a successful phishing attack may include unauthorized transactions on accounts, changes to personal information, or signs of identity theft. The damage from phishing can be severe, leading to compromised data and financial loss. As for organizations, a successful attempt can result in major security breaches, exposing sensitive consumer information and possibly incur regulatory fines.

Prevention and Protection Recommendations

Multi-factor authentication adds an essential layer of security by requiring users to verify their identity through several means. This can definitely reduce the likelihood of unauthorized access.

Employing advanced email filtering technologies can help detect and block phishing messages before they reach the users inbox. This approach can reduce the number of successful phishing attempts within an organization.

Conclusion

To summarize, the security landscape for both individuals and companies is definitely filled with challenges by malware, ransomware, phishing and smishing attacks. Understanding the vulnerabilities in computer systems is crucial for implementing effective defensive strategies, such as education, awareness, data backups, and multi-factor authentication, in order to prevent and protect ourselves from associated security threats.

 

References

TestOut Corp. (2024). CertMaster Learn Tech+. http://www.testout.com

Geeks for Geeks, (2020) Difference between Malware and Ransomware | Difference between Malware and Ransomware - GeeksforGeeks

Ghazi-Tehrani & Pontell (2021) Phishing Evolves: Analyzing the Enduring Cybercrime, Victims & Offenders, 16:3, 316-342, DOI: 10.1080/15564886.2020.1829224 | https://doi.org/10.1080/15564886.2020.1829224

 

 

 

 

 

 

 

 

 

 

Comments

Popular posts from this blog

Programming Languages: Scratch Coding

The Role of Computers and Artificial Intelligence (AI) in HealthCare

Mobile Web Application Critique