Network Security

“Ping of Death” is a type of attack that can happen via ping. It is a denial of service (DoS) attack
caused by an attacker deliberately sending an internet protocol (IP) packet larger than the 65,536
bytes allowed by the IP protocol. Sending a ping packet larger than 65,535 bytes violates the
Internet Protocol, attackers would send the malicious packets in fragments. When the targeted
system attempts to reassemble the fragments, they end up with an oversized packet that could
lead to their system crashing.





Defined by our text, a security hole, or vulnerability, is an aspect of a computer that can be used
to breach security (Vahid). Essentially, it is a weakness in the system. The security holes are
typically found in the operating system (OS) or may exist in software. Once the security hole has
been discovered, the operating system developers make an update to close the holes. For this
reason, it is recommended to keep your OS up to date. In order to protect your system, you can
either periodically check for new updates or your OS might notify you when new updates are
available or run a scan for vulnerabilities.

Phishing is a type of attack where you are sent an email that appears to be from a known source
and asks you to provide sensitive information by including a link for you to click on and put your
information into what seems to be a legit website. Once you enter in your information, it goes
straight to the hackers who sent the initial email. You can protect yourself by not clicking on
links in emails from unknown sources and installing a tool that will help filter through your
emails and remove the “fishy” ones.

With both attacks, your system can become compromised and private information can get into
the wrong hands.



References
Vahid, F., & Lysecky, S. (2017). Computing technology for all. Retrieved from
zybooks.zyante.com/
Nguyen, K. Rosoff, H. John, R. (28 July 2017) Valuing information security from a phishing
attack. Retrieved from https://academic.oup.com/cybersecurity/article/3/3/159/4055925
Gavett, B. Zhao, R. John, S. Brussell, C. Roberts, J. Yue, C. (3 February 2017). Phishing
suspiciousness in older and younger adults: The role of executive functioning. Retrieved from
https://journals.plos.org/plosone/article?id=10.1371/journal.pone.0171620

Comments

Popular posts from this blog

Programming Languages

Traveling Through a Network: Ping vs Traceout