Network Security
Computers
are very vulnerable to many different kinds of threats. I will be focusing on phishing
and password-cracking threats. A phishing threat is an email scam trying to get
the user to provide sensitive information such as passwords or social security
numbers so the scammer can either use themselves or sell that information to
other scammers. Some of the best ways to identify phishing emails are to first
look for spelling errors, see if the greeting is generic, and see if there are any ties
to the company, such as accounts or services. If you need clarification on
whether an email is legit, always contact the company through their official
website and not through the contact information within the email. The other threat
that can compromise a computer is password cracking. Password cracking can take
many forms; the first is by brute force, which means the hacker keeps plugging
inconceivable combinations of characters in order to guess the right ones in
the correct order. Another is social engineering, which is when the hacker
manipulates someone into handing over their sensitive information, usually by
phishing emails.
Both the phishing and the password creaking threats could have detrimental consequences for the victim and for the company. This could be a loss of reputation, legal liability, identity theft, and much more. To prevent both threats, ensure the computer's security software is up-to-date and use a two-factor authentication system whenever possible.
Resources
Eller, C. (Nov. 23, 2023). Why is Information
Security Important/ 7 Compelling Reasons. ISMS Connect. Retrieved by https://isms-connect.com/insights/why-is-information-security-important-7-compelling-reasons
Federal Trade Commission Consumer Advice. (n.d.). How
to Recognize and Avoid Phishing Scams. Retrieved by https://consumer.ftc.gov/articles/how-recognize-and-avoid-phishing-scams
Freda, A. (Nov. 5, 2021). Password Cracking Techniques
Hackers Use and How to Avoid Them. AVG. Retrieved by https://www.avg.com/en/signal/password-cracking-techniques-hackers-use?utm_source=commissionjunction&utm_medium=affiliate&utm_campaign=100357191&utm_content=15093860&couponfield=yes&cjevent=e74a8f6f27a111ef8215a2c70a82b82c&trafficSource=affiliate&partnerid=100357191&programtype=CJ&clickID=e74a8f6f27a111ef8215a2c70a82b82c&cjid=100357191
Geeks for Geeks. (Aug. 21, 2022). How to Defend
Against Password Cracking of Systems? Retrieved by https://www.geeksforgeeks.org/how-to-defend-against-password-cracking-of-systems/
Vahid, F., & Lysecky, S. (2019). Computing technology for all. zyBooks.
Comments
Post a Comment