Network Security
For individuals and organizations, the security of their systems should be vitally important. Protecting the information within a system can ensure that it doesn’t fall into the wrong hands beside the user or company that it is intended for. Also, the security system should be protected so that there is no failure within the programs or parts of that system. When it comes to ping commands and the types of attacks that can come from using them to network, there is one that comes to mind. Denial of Service is an attack that can come from ping commands. According to our textbook, a DoS attack is achieved by submitting huge numbers of access requests simultaneously to one target website, causing that site's web server to be overloaded, thus preventing legitimate requests from being handled and by determining the source of the attack from IP addresses is how DoS can be prevented (Lysecky & Vahid, 2017). There is a wide variety of security risks that can cause many issues for technology. I will discuss two different types of security incidents which are computer viruses and password cracking. Computer viruses can completely destroy a system from the inside, it usually happens without permission. When it comes to downloading from the internet, receiving links, email, and many more can have the potential to have a virus that will steal and cause harm to the computer. Protection against viruses can be as simple as downloading a security software like McAfee that I use that finds and blocks viruses before they spread. Password cracking is a common security probably due to a lack of awareness when it comes to how important a password can protect one’s information. Making strong passwords, not using the same password for everything, enable two method security for logins are just some ways that cracking can be prevented. Security is very important in the concept of the ongoing advancements in technology that continue to spread throughout our society.
References:
Gurubaran, S. (2020). Operating Systems Can Be Detected Using Ping Commands. Retrieved from Operating Systems can be Detected using Ping Command (gbhackers.com)
Lysecky, S. & Vahid, F. (2017). Computing technology for all. Retrieved from zybooks.zyante.com/
Comments
Post a Comment