As the world of the Technologies of
Information grow there are certain vulnerabilities that need caution from users.
Different kinds of attacks with different purposes can occur. Spying, Phishing,
disruption and steeling of information happen every time and they arise the
necessity to protect your information and systems on a home and enterprise
levels. While it can be an easy task, it all depends on the level of protection
that you or your company could want or you or they could need and there are different
actions that can be taken.
Ping Command Attacks mainly work by trying
the reachability of a device on different categories, they mostly send ICMP
messages with the intention to disrupt or alter the function of data links to
infiltrate on Networks or mislead the direction that packets are sent with
malicious purposes.
Recommendations are Implementing Port
Security measures and Access Control Lists (ACLs).
Host and Port Scanning: Attackers
usually use one of these techniques to identify hosts for further examination,
which includes network scanning, ping broadcast and Denial of Service (2007, Analysis
of Network Communication Attacks).
Recommendations are Implementing Port
Security Measures and utilizing Firewalls.
Denial of Service (DDoS) Attacks: Information
can be deliberately sent to halt ports on a switch and that could make an
information overflow causing system disruption and making way for different
kinds of treats like impersonation and infiltration.
Recommendations are Port Security Measures and Intrusion Preventions Systems and Intrusion Detection Systems (IPS and IDS).
Ping of Death (Long ICMP): When packets
larger than the allowed (65536 bytes) by the IP Protocol are sent, the packet
can be dropped, and which requires an action by the OS. When the action is
taken, attackers could infiltrate by acquiring network information and there
could be threats.
Recommendations: Implement Port Security
Measures and Access Control Lists (ACLs).
Different security incidents that could
lead to threats, Information loss and information exposal could be against you
or your company and for that there are different security measures that could
be taken. That includes Computer Viruses and Social Engineering.
Computer
Viruses: Are programs that usually run on computers and that usually spread by
e-mail and affect the function of the system while putting data and personal
information at risk.
For Computers Viruses it is recommended
to use Antivirus.
Social
Engineering: Involves users with malicious intentions trying to steal
information or infiltrate on data by any means, it could be by psychological
manipulation, or even trying to scam you, by phone, in person or so on.
It is recommended information awareness and
protect your assets and data.
At its different levels, security can be applied and tested and that can start by common means leading to more in depth techniques to control unwanted activity on your systems and programs. It is recommended to keep your information on a healthy and secure environment, thus keeping good technological habits its important. For that at its most basic levels, it is important to protect your computer with Anti Viruses and Firewalls. Depending on the level of usage your or your company might have there could be other measures that would have to be taken and that would require a very technical learning or opt to purchase security services by a professional or professionals.
No comments:
Post a Comment