Skip to main content

NETWORK SECURITY

 


Ping Commands' primary use is to test various points in network connectivity. Unfortunately, the ping command can be used to attack a network or website. These attacks are often called Denial of Service (DoS), which overloads a web server by sending too many ping requests. DoS attacks can slow down the web server, even causing it to crash (Guru99.com, 2020). These attacks work because the ping command requires sending small packets of information out to an IP address, which sends a response back. When thousands of ping commands are sent to one IP address or a web server, it causes it to slow down or crash due to the vast amount of bandwidth needed to process the packets being sent.

A computer virus is a malicious software that infects the computer to spread to other networks and computers. Symptoms of a computer virus may vary based on the type of virus. However, common symptoms are unusually slow performance, frequent crashes, unknown programs, and mass emails being sent from your account (Fruhlinger, 2019). Protecting your computer is essential and can be done so by installing antivirus software. Antivirus software has its limitations and can only stop what viruses are known to the software. Along with antivirus software, it is vital to keep your Operating System up to date because of virus attack vulnerabilities in your OS (Fruhlinger, 2019).

Phishing is an internet scam that attempts to steal sensitive information from users, usually by email (Vahid et al., 2017). Criminals encourage victims to download or visit websites that will secretly install malicious software or persuade a user to enter personal information. Each attack is different and can result in money lost for a company or a personnel bank account being emptied. It is essential to remain the causes of phishing attacks when using email. Avoid clicking any links or downloading any software that may seem suspicious. Phishing attacks often have poor grammar or unusual email sender. Training is the best way to identify and circumvent any phishing attacks.

References

Fruhlinger, J. (2019). Viruses explained: How they spread and 5 signs you’ve been infected. Retrieved from https://www.csoonline.com/article/3406446/what-is-a-computer-virus-how-they-spread-and-5-signs-youve-been-infected.html

Guru99.com. (2020) Dos (Denial of Service) Attack Tutorial: Ping of Death, DDOS. Retrieved from https://www.guru99.com/ultimate-guide-to-dos-attacks.htm

Vahid, F., & Lysecky, S. (2017). Computing technology for all. Retrieved from zybooks.zyante.com/

 

Comments

Popular posts from this blog

REDDIT MOBILE APP: A BRIEF REVIEW

       Reddit is a social media platform where people can discuss and view topics that are of their interest. Reddit is accessed through a web browser or mobile app. I have used the mobile app for over eight years and love it. The concept differs from the traditional social media giants (Facebook, Instagram, and Twitter) in that the users don’t post selfies or personal information (typically). The app allows users to post images, videos, or ask a question. Users post whatever they want in specific categories called subreddits. The app also uses an up-vote/down-vote system where the most popular posts will populate the home page and generate the most discussions. Reddit has a home page that contains the most popular post for any given category. The users can tailor their viewing experience by following subreddits that are of interest to them. The heart of the app is in the comment section, where users can discuss with one another. The comment section follows the same ...

JAVA: Object-Oriented Programming Concepts

As a technical professional, it's crucial not only to possess the ability to work with programming languages like Java but also to effectively communicate complex concepts in a way that resonates with both technical and non-technical audiences. Let’s explore Java installation briefly and dive into the core principles of object-oriented programming (OOP) that form the backbone of Java development. Java Installation: Setting the Foundation To begin working with Java, the first step is to ensure that the Java Development Kit (JDK) is properly installed on your machine. The JDK includes everything needed to compile and run Java applications. While I won’t walk through every step here, I recommend referring to official documentation or trusted guides for detailed installation instructions.      To download JDK 23, follow the address below: https://www.oracle.com/java/technologies/downloads/?er=221886     I nstallation instruction can be found here: https://...

PROGRAMMING IN SCRATCH

My experience building in the Scratch program was difficult at first. I had to watch multiple tutorials to understand basic operations. My goal was to try to utilize different code lines to learn as much as possible while creating a unique program. I had trouble with figuring out what function performed what operation. Specifically, I had difficulty with incorporating sound. I tried timing it right with my characters' dialogue, but the sound did not start when I  wanted it to begin. Eventually, I figured it out by using the wait function. I learned quickly what everything did after playing around with the different functions. I feel with more time and exploring the various functions; I could have made a better product. There is still a lot for me to learn in Scratch. I enjoyed learning about the different types of coding languages within the course text. Python seems to be the easiest for me to understand, and Machine Learning was the hardest to grasp. However, Machine Language w...