Network Security


Computers are very vulnerable to many different kinds of threats. I will be focusing on phishing and password-cracking threats. A phishing threat is an email scam trying to get the user to provide sensitive information such as passwords or social security numbers so the scammer can either use themselves or sell that information to other scammers. Some of the best ways to identify phishing emails are to first look for spelling errors, see if the greeting is generic, and see if there are any ties to the company, such as accounts or services. If you need clarification on whether an email is legit, always contact the company through their official website and not through the contact information within the email. The other threat that can compromise a computer is password cracking. Password cracking can take many forms; the first is by brute force, which means the hacker keeps plugging inconceivable combinations of characters in order to guess the right ones in the correct order. Another is social engineering, which is when the hacker manipulates someone into handing over their sensitive information, usually by phishing emails.

            Both the phishing and the password creaking threats could have detrimental consequences for the victim and for the company. This could be a loss of reputation, legal liability, identity theft, and much more. To prevent both threats, ensure the computer's security software is up-to-date and use a two-factor authentication system whenever possible.


Resources

Eller, C. (Nov. 23, 2023). Why is Information Security Important/ 7 Compelling Reasons. ISMS Connect. Retrieved by https://isms-connect.com/insights/why-is-information-security-important-7-compelling-reasons

Federal Trade Commission Consumer Advice. (n.d.). How to Recognize and Avoid Phishing Scams. Retrieved by https://consumer.ftc.gov/articles/how-recognize-and-avoid-phishing-scams

Freda, A. (Nov. 5, 2021). Password Cracking Techniques Hackers Use and How to Avoid Them. AVG. Retrieved by https://www.avg.com/en/signal/password-cracking-techniques-hackers-use?utm_source=commissionjunction&utm_medium=affiliate&utm_campaign=100357191&utm_content=15093860&couponfield=yes&cjevent=e74a8f6f27a111ef8215a2c70a82b82c&trafficSource=affiliate&partnerid=100357191&programtype=CJ&clickID=e74a8f6f27a111ef8215a2c70a82b82c&cjid=100357191

Geeks for Geeks. (Aug. 21, 2022). How to Defend Against Password Cracking of Systems? Retrieved by https://www.geeksforgeeks.org/how-to-defend-against-password-cracking-of-systems/

Vahid, F., & Lysecky, S. (2019). Computing technology for all. zyBooks.

Comments

Popular posts from this blog

Programming Languages

Documenting a Day