Post #  6

Week Four Assignment  - Network Security

My Week Four assignment on Network Security assignment was one that I enjoyed because it is what I have wanted to study for years. I am hoping that this post is illustrative on the subject. I have not seen feedback for this post as of yet. Thank yo all 

Network security is the primary concern of many businesses worldwide, considering the many threat actors challenging individuals and companies' networks. We have seen multiple attacks from independent and nation-states with broad implications that wreak havoc on commerce and infrastructure. Building new strategies to defend against vulnerabilities will undoubtedly be at the forefront of those concerned with mitigating threats.      

The Importance of Information and System Security for Individuals and Organizations.

The likelihood of organizations and individuals encountering malicious acts against their computer infrastructure is almost an eventual certainty. To what extent those adverse actions make on networks and the hardware is directly dependent on how well prepared individuals and companies are.

Computer Viruses


Computer viruses have come to be somewhat ubiquitous, especially since the advent of an always-on internet environment. We have seen more traffic from malicious sources that produced viruses, such as the Colonial Pipeline cyber security attack. This attack occurred due to the threat actors gaining access to the colonial Pipeline's network by implanting ransomware that took control of vital software controlling devices used to regulate the flow of petroleum along the entirety of the delivery system. This ransomware attack is similar to that levied against unsuspecting individuals and businesses to force them to pay a ransom for their data and control of their computers. A way to fight ransomware is to have a robust backup program set up to enable reinstatement of normal computer functions. Maintaining up-to-date antivirus programs is another means to combat ransomware attacks.

Social Engineering

Social engineering is the systematic approach of using persuasion to affect change in individuals that exploit vulnerabilities. Zhu and Sun (2021). Some of these attacks begin with seemingly benign inquiries about personal information. From there, they escalate to include questions about the business and then the network itself. The aim is to gain access to networks by gathering bits of information to build a big picture view of the entirety of the network, including its vulnerabilities which primarily are the typical user. Washo (2021).

Combating this type of threat requires immersing the system's users in training that stresses privacy, password protection, and a layered security system that requires varying levels of protected security access. Vahid & Lysecky (2017).

Conclusion

Network security is the responsibility of all users on a network because networks are only as strong as the policies that govern them and the people who follow those protocols. Staying abreast of possible threats and their sources can enable Information technology professionals to stem the tide of malware, including ransomware, trojan horses, phishing expeditions, and social engineering.

 

 

 

References

Vahid, F., & Lysecky, S. (2017), Computing technology for allSection 8.3 - INT 100: Fundamentals of Information Technology & Literacy (zybooks.com)

Z. Wang, H. Zhu and L. Sun, "Social Engineering in Cybersecurity: Effect Mechanisms, Human Vulnerabilities and Attack Methods," in IEEE Access, vol. 9, pp. 11895-11910, 2021, doi: 10.1109/ACCESS.2021.3051633.

Washo, A. H. (2021). An interdisciplinary view of social engineering: A call to action for research. Computers in Human Behavior Reports4. https://doi-org.proxy-library.ashford.edu/10.1016/j.chbr.2021.100126

 

 

 

 

No comments:

Post a Comment

Algorithmic Design and Data Structure Techniques for Newbies.

Some of us have an innate fear or at least a little apprehension about learning new technology, and algorithmic design and data structure te...