Post #6 - Network Security

Information and System Security is a necessity when utilizing a computer on both personal and professional levels. A common type and most well-known type of ping attack is a DoS or Denial of Service attack. This attack will attempt to destabilize any type of firewall and ultimately crash a computer's service or freeze existing actions. This can be done with a single ping command that contains an oversized/malformed packet. This is otherwise known as a Ping of Death.

In addition to the discussion on ping attacks, I will be discussing the dangers of email spam and phishing attempts. Any person who utilizes an email will have spam that comes through. Many of these spam emails will be filtered by a spam identification program but it is never 100% reliable. There is always a danger of misinterpreting a spam email as something more innocent. It is important to understand when these emails are attempting to bait you into giving up important information. This is also known as phishing, which is common within spam emails. Phishing emails are malicious in nature and only aim to deceive the reader. A study conducted by Patel in 2019 showed that many Phishing attempts utilized large images including company logos which could deceive inexperienced users. “Regressing feature ratings onto the MDS coordinates revealed that similarity judgments were influenced mostly by advertisement/large images and collecting personal information, regardless of presence or absence of company logos and urgent actionable links” (Patel 2019). Downloadable content also played a role in which emails were tagged as phishing emails. Phishing and Spam emails go hand in hand when it comes to harassing email users. Moore (2009) observed that Phishing websites sent the most spam emails within the first week of its creation and then slowly deteriorated or stopped altogether once the website was determined malicious and taken down. Some websites will continue to promote spam even after being taken down.

Any of these attacks can result in a major compromise of the system’s integrity. This kind of compromise would jeopardize the information of whoever utilizes the system. For a workplace, that could mean employees as well as clients and consumers of the service. For an individual, this can be yourself as well as anyone who has interacted with the account.

It is acknowledged within professional settings how important information and system security is. “The success of this effort appeared to hinge on top management championing information system security initiatives and propagating an awareness of the importance of information security among employees at all levels of the company” (Qing 2007). The “success” mentioned here is a company’s reliability and resulting trust and confidence from consumers. A security system that was used decades ago may be severely out of date and could lead to holes within a system. Updating security measures may be daunting but can only lead to better safe practices.

My own company has an option for any email to be reported as a phishing attempt. I have found this feature to be incredibly useful and helps me determine whether to give a suspicious email the time of day. I much prefer the method that allows me to get confirmation from our experts that an email is safe. There is also a service implemented within our firewall that filters any emails that are unfamiliar or could contain malicious links and files. We are given the option to manually review these if we do know where it is coming from and if it is expected. Again, a resource that allows input from the reader rather than assuming that any sort of spam detection is legitimate.




References

Moore, T., Clayton, R., Stern, H. (2009). Temporal Correlations Between Spam and Phishing

Websites.

Patel, P., Sarno, D. M., Lewis, J. E., Shoss, M., Neider, M. B., Bohil, C. J. (July 2019).

Perceptual representation fo spam and phishing emails.

Qing, H., Hart, P., Cooke, D. (June 2007). The role of external and internal influences on

information systems security - a neo-institutional perspective. Volume 16, Issue 2.

Vahid, F., & Lysecky, S. (2019). Computing technology for all. zyBooks.

Comments