Skip to main content

NETWORK SECURITY

 


Ping Commands' primary use is to test various points in network connectivity. Unfortunately, the ping command can be used to attack a network or website. These attacks are often called Denial of Service (DoS), which overloads a web server by sending too many ping requests. DoS attacks can slow down the web server, even causing it to crash (Guru99.com, 2020). These attacks work because the ping command requires sending small packets of information out to an IP address, which sends a response back. When thousands of ping commands are sent to one IP address or a web server, it causes it to slow down or crash due to the vast amount of bandwidth needed to process the packets being sent.

A computer virus is a malicious software that infects the computer to spread to other networks and computers. Symptoms of a computer virus may vary based on the type of virus. However, common symptoms are unusually slow performance, frequent crashes, unknown programs, and mass emails being sent from your account (Fruhlinger, 2019). Protecting your computer is essential and can be done so by installing antivirus software. Antivirus software has its limitations and can only stop what viruses are known to the software. Along with antivirus software, it is vital to keep your Operating System up to date because of virus attack vulnerabilities in your OS (Fruhlinger, 2019).

Phishing is an internet scam that attempts to steal sensitive information from users, usually by email (Vahid et al., 2017). Criminals encourage victims to download or visit websites that will secretly install malicious software or persuade a user to enter personal information. Each attack is different and can result in money lost for a company or a personnel bank account being emptied. It is essential to remain the causes of phishing attacks when using email. Avoid clicking any links or downloading any software that may seem suspicious. Phishing attacks often have poor grammar or unusual email sender. Training is the best way to identify and circumvent any phishing attacks.

References

Fruhlinger, J. (2019). Viruses explained: How they spread and 5 signs you’ve been infected. Retrieved from https://www.csoonline.com/article/3406446/what-is-a-computer-virus-how-they-spread-and-5-signs-youve-been-infected.html

Guru99.com. (2020) Dos (Denial of Service) Attack Tutorial: Ping of Death, DDOS. Retrieved from https://www.guru99.com/ultimate-guide-to-dos-attacks.htm

Vahid, F., & Lysecky, S. (2017). Computing technology for all. Retrieved from zybooks.zyante.com/

 

Comments

Popular posts from this blog

JAVA: Object-Oriented Programming Concepts

As a technical professional, it's crucial not only to possess the ability to work with programming languages like Java but also to effectively communicate complex concepts in a way that resonates with both technical and non-technical audiences. Let’s explore Java installation briefly and dive into the core principles of object-oriented programming (OOP) that form the backbone of Java development. Java Installation: Setting the Foundation To begin working with Java, the first step is to ensure that the Java Development Kit (JDK) is properly installed on your machine. The JDK includes everything needed to compile and run Java applications. While I won’t walk through every step here, I recommend referring to official documentation or trusted guides for detailed installation instructions.      To download JDK 23, follow the address below: https://www.oracle.com/java/technologies/downloads/?er=221886     I nstallation instruction can be found here: https://docs.oracle.com/en/java/j

PROGRAMMING IN SCRATCH

My experience building in the Scratch program was difficult at first. I had to watch multiple tutorials to understand basic operations. My goal was to try to utilize different code lines to learn as much as possible while creating a unique program. I had trouble with figuring out what function performed what operation. Specifically, I had difficulty with incorporating sound. I tried timing it right with my characters' dialogue, but the sound did not start when I  wanted it to begin. Eventually, I figured it out by using the wait function. I learned quickly what everything did after playing around with the different functions. I feel with more time and exploring the various functions; I could have made a better product. There is still a lot for me to learn in Scratch. I enjoyed learning about the different types of coding languages within the course text. Python seems to be the easiest for me to understand, and Machine Learning was the hardest to grasp. However, Machine Language w

Operating System Theory and Concept Map

Operating systems (OS) carry out various crucial functions that enable computers to operate efficiently and act as an interface between hardware and software. The major functions of an OS can be categorized into several key areas. Process management is one of the core functions, where the OS is responsible for creating, scheduling, and terminating processes, ensuring that multiple programs can run simultaneously without conflicts. Memory management ensures that each process has enough memory to execute properly while optimizing available physical and virtual memory to prevent crashes or slowdowns. File system management handles the creation, deletion, reading, and writing of files on various storage devices while maintaining security and organization. Device management ensures smooth communication between hardware components like printers, hard drives, and USB devices by using device drivers. Finally, security and access control protect the system's resources, enforcing rules about