Post #6 Network Security
There are two types of attacks that can be carried out using ping commands. Ping floods and Smurf attacks. Ping floods simply send an overflow of request packets that overwhelm a network. A smurf attack is similar, however, it hides the true origin of the attack using spoof IPs.
Vulnerability
When it comes to malware/ransomware and phishing/smishing scams, it is usually the
fault of the user falling for the scam. Many of these security incidents cannot do much harm
without the user clicking on the malicious link in the scam. Malware and ransomware threats
work by locking or encrypting certain files so the user cannot access them anymore, typically
requiring a ransom to be paid to get their files back. Phishing and smishing threats are primarily
focused on trying to gain login credentials through acts like keylogging from a fake link that
contains a keylogger. The links take the user to a website that looks almost identical to the real
website and trick them into logging into the site, giving the threat actors all the credentials they
need to login to the real site as the real user.
Potential Damages
Some of the damages that can be caused by these computer security incidents can very
depending on the type of attack and scale of the attack. Some threat actors will go after entire
companies for a reason other than money, like trying to expose them or shut them down. Smaller
scale phishing and smishing tactics try to get random people and trick them into entering in
passwords and logins to websites like banking sites; they then can drain that account and take all
of the users’ money. Malware and Ransomware attacks tend to be a little worse if they target
large corporations. An example of the damages a ransomware attack could cause would be if
threat actors infected a bank’s network and encrypted the files so nobody but the threat actors
could access them. This would cause all the bank’s customers to not have access to their banking
information, cards, or even ATMs. They can then demand a ransom be for the release of the files
back into the hands of the bank; even if the ransom is paid, there is no guarantee that the
attackers will hold up their end of the deal.
Recommendations
The first recommendation that I would give to protect from both malware/ransomware
and phishing/smishing attacks is to take a cybersecurity training course and learn how to spot
these attacks before they cause a problem. A second recommendation for protecting a network
from ransomware and malware attacks would be to not pay the ransom, as the National Cyber
Security Centre recommends and go directly to law enforcement. This will help ensure that at the
end you will get access to the files back. A second recommendation for dealing with phishing
and smishing would be to verify that the URL listed is the correct URL for the real website that
the phishing or smishing attempt is claiming to be. (TestOut Corp. 2025). This will ensure that
you are not putting your login information into a malicious website.
Comments
Post a Comment