Friday, May 28, 2021

Network Security

 


Security within networks is the most crucial aspect of ensuring that a network operates at an optimal level and ensuring that no personally identifiable information is leaked online. Both information and system security are essential to an individual and an organization. To the individual, if you allow someone to get personal information from you by either phishing or other means, it could leave you vulnerable to bank fraud and identity theft, among lots of other things. For the organization, it is crucial to ensure system security to make sure intruders outside of the network cannot get into and disable or harm the systems of operation. Furthermore, depending on the information classification, there is a possibility of information causing a threat to national security. Typically organizations have a wealth of information about employees and dealings within the company that, if not controlled, could cause harm to the employees and the organization as a whole. There are several ways to ensure you are not vulnerable such as passwords, education, and anti-virus software. Many types of attacks can harm your network, and I will be discussing two of them: phishing and security holes and vulnerability. First, phishing is defined as a fraudulent attempt by attackers to gain sensitive information by the impersonation of a reputable source using email or other online communication (PhishingTackle.com, 2021). Typically, someone trying to launch a phising attack will impersonate an organization by making themselves look credible. They will most likely try to make the email or phone call look and sound just like it would if a bank were to call you or ask for your information. However, the best way to defend against phishing is through education. Most banks or companies will not ask for your personal information or account numbers via email or phone call. Typically, you would reach out first and provide them that information. It is crucial for people inside an organization to verify emails before clicking links within an email. I have personally seen phishing attacks where they act as an IT department and Page 3 ask for specific information about individuals and organizational policies. Phishing does not just have to be about money; it could also be about getting information that could harm the organization or company. To this day, there is no 'catch-all' method for stopping phishing; one must remain vigilant at all times and treat all emails and websites with caution when online (PhishingTackle.com, 2021). Now that we have discussed phishing, let's discuss security holes and vulnerabilities. In its simplest term, network security is a set of rules and configurations designed to protect the integrity, confidentiality, and accessibility of computer networks and data using both software and hardware technologies (What Is Network Security, 2021). Having network security will allow you to mitigate your vulnerabilities within your network. Scanning your network regularly using either hardware or software to check for vulnerabilities is crucial. If you leave yourself susceptible to attacks, it will be easier for the intruder to get inside the network. Furthermore, you can set specific rules within the systems to make them even more fortified— little things such as complex passwords or changing your password every thirty days. There also encryption devices that you could utilize to make it harder for the adversary as well. In summary, you must educate your users within your network. It is also essential that you constantly monitor your network for vulnerabilities and make sure you prevent and many security issues as possible. Martina Navratilova said it best "security used to be an inconvenience sometimes, but now it's a necessity all the time."


Jelen, S. (2021, May 25). Social Engineering: What Is It? Types of Social Engineering Attacks 

and How to Protect Yourself from Them. Security Trails. 

https://securitytrails.com/blog/social-engineering-attacks

PhishingTackle.com. (2021, January 6). Phishing: What is it and how does it affect me in 2021?

Phishing Tackle. https://www.phishingtackle.com/phishing/

Rungta, K. (2021, May 22). DoS (Denial of Service) Attack Tutorial: Ping of Death, DDOS. 

Guru 99. https://www.guru99.com/ultimate-guide-to-dos-attacks.html

What is Network Security? (2021, May 6). Forcepoint. https://www.forcepoint.com/cyberedu/network-security

Vahid, F., & Lysecky, S. (2017). Computing technology for all. Retrieved from 

zybooks.zyante.com/

No comments:

Post a Comment

Structured Programs

Development of Structured Programs A data structure is a technique of storing and organizing information so that it may be employed effect...