Post #6 Network Security

 

There are two types of attacks that can be carried out using ping commands. Ping floods and Smurf attacks. Ping floods simply send an overflow of request packets that overwhelm a network. A smurf attack is similar, however, it hides the true origin of the attack using spoof IPs.

Vulnerability

When it comes to malware/ransomware and phishing/smishing scams, it is usually the 

fault of the user falling for the scam. Many of these security incidents cannot do much harm 

without the user clicking on the malicious link in the scam. Malware and ransomware threats 

work by locking or encrypting certain files so the user cannot access them anymore, typically 

requiring a ransom to be paid to get their files back. Phishing and smishing threats are primarily 

focused on trying to gain login credentials through acts like keylogging from a fake link that 

contains a keylogger. The links take the user to a website that looks almost identical to the real 

website and trick them into logging into the site, giving the threat actors all the credentials they 

need to login to the real site as the real user. 

Potential Damages 

Some of the damages that can be caused by these computer security incidents can very 

depending on the type of attack and scale of the attack. Some threat actors will go after entire 

companies for a reason other than money, like trying to expose them or shut them down. Smaller 

scale phishing and smishing tactics try to get random people and trick them into entering in 

passwords and logins to websites like banking sites; they then can drain that account and take all 

of the users’ money. Malware and Ransomware attacks tend to be a little worse if they target 

large corporations. An example of the damages a ransomware attack could cause would be if 

threat actors infected a bank’s network and encrypted the files so nobody but the threat actors 

could access them. This would cause all the bank’s customers to not have access to their banking 

information, cards, or even ATMs. They can then demand a ransom be for the release of the files 

back into the hands of the bank; even if the ransom is paid, there is no guarantee that the 

attackers will hold up their end of the deal.

Recommendations 

The first recommendation that I would give to protect from both malware/ransomware 

and phishing/smishing attacks is to take a cybersecurity training course and learn how to spot 

these attacks before they cause a problem. A second recommendation for protecting a network 

from ransomware and malware attacks would be to not pay the ransom, as the National Cyber 

Security Centre recommends and go directly to law enforcement. This will help ensure that at the 

end you will get access to the files back. A second recommendation for dealing with phishing 

and smishing would be to verify that the URL listed is the correct URL for the real website that 

the phishing or smishing attempt is claiming to be. (TestOut Corp. 2025). This will ensure that 

you are not putting your login information into a malicious website.

Comments

Popular Posts

Post #7 E-commerce Sites

Post #4 Travelling Through a Network

Post #1 Programming Languages