Post # 6
Week Four Assignment - Network Security
My Week Four assignment on Network Security assignment was one that I enjoyed because it is what I have wanted to study for years. I am hoping that this post is illustrative on the subject. I have not seen feedback for this post as of yet. Thank yo all
Network
security is the primary concern of many businesses worldwide, considering the
many threat actors challenging individuals and companies' networks. We have seen
multiple attacks from independent and nation-states with broad implications
that wreak havoc on commerce and infrastructure. Building new strategies to defend against vulnerabilities
will undoubtedly be at the forefront of those concerned with mitigating
threats.
The Importance of
Information and System Security for Individuals and Organizations.
The
likelihood of organizations and individuals encountering malicious acts against
their computer infrastructure is almost an eventual certainty. To what extent those
adverse actions make on networks and the hardware is directly dependent on how
well prepared individuals and companies are.
Computer
Viruses
Computer
viruses have come to be somewhat ubiquitous, especially since the advent of an
always-on internet environment. We have seen more traffic from malicious
sources that produced viruses, such as the Colonial Pipeline cyber security
attack. This attack occurred due to the threat actors gaining access to the
colonial Pipeline's network by implanting ransomware that took control of vital
software controlling devices used to regulate the flow of petroleum along the
entirety of the delivery system. This ransomware attack is similar to that
levied against unsuspecting individuals and businesses to force them to pay a
ransom for their data and control of their computers. A way to fight ransomware
is to have a robust backup program set up to enable reinstatement of normal computer
functions. Maintaining up-to-date antivirus programs is another means to combat
ransomware attacks.
Social
Engineering
Social
engineering is the systematic approach of using persuasion to affect change in individuals
that exploit vulnerabilities. Zhu
and Sun (2021). Some of these attacks begin with seemingly benign inquiries about
personal information. From there, they escalate to include questions about the
business and then the network itself. The aim is to gain access to networks by
gathering bits of information to build a big picture view of the entirety of
the network, including its vulnerabilities which primarily are the typical user.
Washo (2021).
Combating this type of threat requires immersing
the system's users in training that stresses privacy, password protection, and a
layered security system that requires varying levels of protected security
access. Vahid & Lysecky (2017).
Conclusion
Network security is the responsibility of all
users on a network because networks are only as strong as the policies that
govern them and the people who follow those protocols. Staying abreast of
possible threats and their sources can enable Information technology
professionals to stem the tide of malware, including ransomware, trojan horses,
phishing expeditions, and social engineering.
References
Vahid, F., & Lysecky, S. (2017), Computing
technology for allSection
8.3 - INT 100: Fundamentals of Information Technology & Literacy
(zybooks.com)
Z. Wang, H. Zhu and L. Sun, "Social Engineering in Cybersecurity:
Effect Mechanisms, Human Vulnerabilities and Attack Methods," in IEEE
Access, vol. 9, pp. 11895-11910, 2021, doi: 10.1109/ACCESS.2021.3051633.
Washo, A. H. (2021). An interdisciplinary view of social
engineering: A call to action for research. Computers in Human Behavior
Reports, 4.
https://doi-org.proxy-library.ashford.edu/10.1016/j.chbr.2021.100126
No comments:
Post a Comment