Thursday, August 22, 2024

As the world of the Technologies of Information grow there are certain vulnerabilities that need caution from users. Different kinds of attacks with different purposes can occur. Spying, Phishing, disruption and steeling of information happen every time and they arise the necessity to protect your information and systems on a home and enterprise levels. While it can be an easy task, it all depends on the level of protection that you or your company could want or you or they could need and there are different actions that can be taken.

Ping Command Attacks mainly work by trying the reachability of a device on different categories, they mostly send ICMP messages with the intention to disrupt or alter the function of data links to infiltrate on Networks or mislead the direction that packets are sent with malicious purposes.

Recommendations are Implementing Port Security measures and Access Control Lists (ACLs).

Host and Port Scanning: Attackers usually use one of these techniques to identify hosts for further examination, which includes network scanning, ping broadcast and Denial of Service (2007, Analysis of Network Communication Attacks).

Recommendations are Implementing Port Security Measures and utilizing Firewalls.

Denial of Service (DDoS) Attacks: Information can be deliberately sent to halt ports on a switch and that could make an information overflow causing system disruption and making way for different kinds of treats like impersonation and infiltration.

Recommendations are Port Security Measures and Intrusion Preventions Systems and Intrusion Detection Systems (IPS and IDS).

Ping of Death (Long ICMP): When packets larger than the allowed (65536 bytes) by the IP Protocol are sent, the packet can be dropped, and which requires an action by the OS. When the action is taken, attackers could infiltrate by acquiring network information and there could be threats.

Recommendations: Implement Port Security Measures and Access Control Lists (ACLs).                                                                                      

Different security incidents that could lead to threats, Information loss and information exposal could be against you or your company and for that there are different security measures that could be taken. That includes Computer Viruses and Social Engineering.

Computer Viruses: Are programs that usually run on computers and that usually spread by e-mail and affect the function of the system while putting data and personal information at risk.

For Computers Viruses it is recommended to use Antivirus.

Social Engineering: Involves users with malicious intentions trying to steal information or infiltrate on data by any means, it could be by psychological manipulation, or even trying to scam you, by phone, in person or so on.

It is recommended information awareness and protect your assets and data.

At its different levels, security can be applied and tested and that can start by common means leading to more in depth techniques to control unwanted activity on your systems and programs. It is recommended to keep your information on a healthy and secure environment, thus keeping good technological habits its important. For that at its most basic levels, it is important to protect your computer with Anti Viruses and Firewalls. Depending on the level of usage your or your company might have there could be other measures that would have to be taken and that would require a very technical learning or opt to purchase security services by a professional or professionals.

No comments:

Post a Comment