Network Security

 

     A ping attack is where the attackers use pings to gather information about target systems such as IP addresses, operating systems and network configuration. This information can then be used to launch more targeted attacks. Another way Pings are used in attacks is by flooding a target system with a massive number of ping requests. The targeted system may then get overwhelmed by trying to process and respond to the request. This consumes bandwidth and resources leading to network congestion and slowdowns and that can lead to services being unavailable for legitimate users.

     The two security incidents that I chose to write about are security holes/vulnerabilities and password cracking. With security vulnerabilities there is a human error factor. Software is created by humans who make mistakes. Even with rigorous testing it is impossible to eliminate all bugs and vulnerabilities in complex software. These vulnerabilities and flaws can be exploited by attackers to gain unauthorized access and to cause damage. The same with coding errors, they can introduce vulnerabilities that attackers can exploit. One recommendation that I would make to protect systems is to have regular security audits that identify and address vulnerabilities. The second security incident I chose to research and write about is password cracking. Password cracking is made easy by people using weak passwords that are easy to remember. Passwords that are easy for attackers to crack or guess like common names, birthdays and simple patterns. Another mistake that is made is re-use of passwords. The problem with re-use of passwords is if one account is compromised then all accounts that use that password are vulnerable. Beyond password cracking other ways that passwords are obtained through data breaches and social engineering attacks that trick users into revealing passwords through phishing emails and fake websites. Some recommendations to keep systems and passwords safe are to use longer and more complex passwords. The longer and more complex the password is the more computing power it takes. A second way to keep passwords and systems safe is to add MFA. This second layer of verification like using a fingerprint makes accounts and systems safer.


References

Harris, R. Hunt, TCP/IP security threats and attack methods, Computer Communications, Volume 22, Issue 10,1999, Pages 885-897,ISSN 0140-3664, https://www.sciencedirect.com/science/article/abs/pii/S014036649900064X

 

Ahmed, M., Sharif, L., Kabir, M., & Al-Maimani, M. (2012). Human errors in information security. International Journal1(3), 82-87.

 

 Vahid, F., & Lysecky, S. (2019). Computing technology for all. zyBooks.

 

Comments

Popular Posts