Skip to main content

Network Security

 

 

 

 


 

 

 

 

 

 


 

The Network Security paper

The Importance of Information and System Security for Individuals and Organizations.

Introduction

In a world where nearly everything is digital, ensuring our information and system security is safe has become paramount for both individuals and organizations. A breach in security can lead to theft of sensitive data, financial loss, and cause irreparable damage to an organizations reputation as well as an individuals life. As technology continues to evolve and cyber threats become more sophisticated, understanding vulnerabilities associated with computer systems and the various types of security incidents is crucial for safety and security of both personal and professional organizational information.

Malware and Ransomware

Malware is short for “malicious software”. It refers to a variety of  harmful software made to damage, disrupt, and/or gain unauthorized access to computer systems and networks. “VirusTrojan horsesworms and spyware are the various types of malware along with a few others. 2. Ransomware : Ransomware is a type of malware that is designed to block user access from own system until a ransom fee is paid to ransomware creator.” (Geeksforgeeks, 2020) Ransomware can attack individuals or organizations, it is also more harmful than other malware. Ransomware is a specific type of malware that can encrypt files on a victim’s device, making them inaccessible until a ransom is paid to the attacker. Computer systems are vulnerable to malware and ransomware, due to a variety of factors, including user negligence (such as accidentally clicking on malicious links or downloading questionable attachments), outdated security systems, and unpatched systems

Symptoms and Damage

Many users may inadvertently download malicious software through phishing emails or compromised websites. Also, inadequate updating of your computer systems can create entry points for cyber criminals. When a system is compromised by ransomware, a user may notice immediately symptoms like the appearance of a ransom note demanding payment or file encryption, which you would notice through changed file extensions, or a noticeable slowdown in system performance. Crypto ransomware encrypts files and demands payments for the encryption key, whereas locker ransomware locks users out of their systems entirely, demanding a ransom to regain access. Such attacks often lead to significant financial losses, and organizations could be forced to pay the ransom or deal with the loss of vital data. It can also lead to operational time being down for a period of time, loss of customer trust, and potentially long-lasting damage to a company’s reputation.

Prevention and Protection

The best protection is educating yourself and being aware of malware and ransomware. Organizations as well as individuals should implement a trustworthy data backup strategy that includes automatic and secure backups to offsite locations. This will make sure that files can be restored in the event of a ransomware attack without having to pay the ransom or lose any data or experience operational downtime. Having regular training sessions to educate employees on how to recognize phishing attempts and malware threats. When a user knows how to identify suspicious emails and links can reduce the risk of accidentally downloading malware.

Phishing and Smishing

Phishing is an automated form of social engineering, where cyber criminals use the internet to fraudulently obtain individuals and businesses information, usually by impersonating a real legitimate website, but is really a fake website that will steal your information.  A typical phishing attack begins with an e-mail to the victim, supposedly from a reputable institution, yet actually from the phisher. The text of the message commonly warns the user that a problem must be immediately corrected with the user’s account. The victim is then led to a spoofed website (a fake one designed to resemble the institution’s official website) (Alsharnouby et al., 2015).(Tehrani & Pontell, 2021)

Computer systems are vulnerable to phishing attacks due to human errors, lack of user awareness, and the sophistication of modern phishing and smishing attacks.

Smishing is short for “SMS phishing;” SMS is “short message service,” the standard the world uses for text messaging (Stembert et al., 2015). Smishing attacks utilize phone text messages and they attack the victim, instead of e-mails, partially to bypass SPAM filters and to reach more potential victims. (Tehrani & Pontell, 2021)

Symptoms and Damage

Symptoms of a successful phishing attack may include unauthorized transactions on accounts, changes to personal information, or signs of identity theft. The damage from phishing can be severe, leading to compromised data and financial loss. As for organizations, a successful attempt can result in major security breaches, exposing sensitive consumer information and possibly incur regulatory fines.

Prevention and Protection Recommendations

Multi-factor authentication adds an essential layer of security by requiring users to verify their identity through several means. This can definitely reduce the likelihood of unauthorized access.

Employing advanced email filtering technologies can help detect and block phishing messages before they reach the users inbox. This approach can reduce the number of successful phishing attempts within an organization.

Conclusion

To summarize, the security landscape for both individuals and companies is definitely filled with challenges by malware, ransomware, phishing and smishing attacks. Understanding the vulnerabilities in computer systems is crucial for implementing effective defensive strategies, such as education, awareness, data backups, and multi-factor authentication, in order to prevent and protect ourselves from associated security threats.

 

References

TestOut Corp. (2024). CertMaster Learn Tech+. http://www.testout.com

Geeks for Geeks, (2020) Difference between Malware and Ransomware | Difference between Malware and Ransomware - GeeksforGeeks

Ghazi-Tehrani & Pontell (2021) Phishing Evolves: Analyzing the Enduring Cybercrime, Victims & Offenders, 16:3, 316-342, DOI: 10.1080/15564886.2020.1829224 | https://doi.org/10.1080/15564886.2020.1829224

 

 

 

 

 

 

 

 

 

 

Comments

Popular posts from this blog

Programming Languages: Scratch Coding

Programming Languages  Programming Languages Paper: Exploring Scratch and Computational Thinking Charla Miller University of Arizona Global Campus TEC101: Fundamentals of Information Technology & Literacy Programming Languages Paper: Exploring Scratch and Computational Thinking Introduction In this assignment, I had the opportunity to research and explore the logic of computational thinking through a drag-and-drop block programming language called Scratch. This application gets you engaged through the platform and allows users to make interactive stories, games and animations, by piecing together “code blocks”, such as Motion or control blocks visually, this can really help beginners of any age. I created a short program, of 30 code blocks in Scratch, and it resulted in a colorful animation that featured a cat in motion around Spaceship and Space City. This paper will discuss my experience learning the programming language, as well as a comparison to the languages introduced in...

The Role of Computers and Artificial Intelligence (AI) in HealthCare

Week 4 Discussion1Blog post 5 TEC101   The Role of Computers in Healthcare   Computers play an important role in the day-to-day operations in healthcare . Computers a re indispensable in hospitals, doctors' offices and in medical research and medical billing. Everything from maintaining patient records, scheduling appointments, monitoring vital signs through pacemaker s that can be read 24/7, even having a surgery with a robotic arm con trolled by a computer. (Scott-Clark Med., 2022 ) Other uses a re telemedicine, and medical diagnostic tools, ( like the computer carts at the hospital), the integration of computers into healthcare has revolutionized the way practi ti oners deliver care to their patients. A prime example of healthcare providers managing patient data is through (EHRs) Electonic Health Records. IT allows providers to streamline administrative tasks and i mprove communication between different healthcare departments. EHRs reduce the risk of errors asso...

Mobile Web Application Critique

Critique of Google. com   Link:        Google   https://www.google.com Links to an external       Google website and app are one of the best tools that millions of people around the world use to get where they are going on the internet, a tool that acts as a doorway to Googles wide variety of other services too. It is available on both web and mobile app. This app has a user-friendly interface that has an integrated search functionality, personalized news feeds, and access to Google Assistant. This review evaluates the usability, functionality, and design of the Google app, and highlights its core features, and suggests areas of improvement.   Google Search Bar with results                                                                       ...