Network Security


Network Security

Network security is a necessity to provide computer security and avoid security breaches. Network security requires more than antivirus software and firewalls. Users must know how to protect their privacy. They should manage the information shared on the internet, adjust privacy settings on apps, and be aware of social engineering ploys to obtain personal information Vahid & Lysecky, 2019). Valuable information should be sent through secure channels using hypertext transfer protocol secure addresses and be encrypted. It is important to remember that users are not anonymous, and data can be easily intercepted. Users should understand network security to protect against spam emails with malware and phishing and even aid in defending denial-of-service attacks.

Spam emails are unrequested mass-produced emails. Although most spam is used for marketing, some contain files with malware or use phishing to scam users. (Vahid & Lysecky, 2019). Users receive emails that appear to be a legitimate business. However, the email either includes a file for the user to download or requests that the user provide personal information directed through an illicit link provided in the email, known as phishing. A contaminated file is usually disguised as a standard program or document and typically contains a virus or trojan. If the user downloads the file, their computer becomes infected with malware from the file. It is possible that the user will not know the spam-contained malware. Although infected computers may run slower, it may not be noticeable, permitting the attacker to spy and access the computer at will. This access may allow attackers admittance to passwords, emails, services, and other confidential information. Similarly, phishing attacks make users' personal information vulnerable as well. Users' passwords and information are stored on the illicit website when they enter their data, giving attackers access and resulting in the same user exposures. Spam emails are not just unsolicited but may also risk network security.

Failure in network security can be harmful. Users may endure financial hardships from stolen bank account passwords, being blackmailed by personal data, or their computers may be used for other illicit affairs. Spam used to infect users' computers may permit the attacker access to the users' email accounts. This enables the attacker to send more spam to the users' contacts and infect more computers. All these possibilities derive from something as simple as a spam email. Internet service providers and email providers set up filters and firewalls using algorithms to detect spam emails (Singh et al., 2023). Companies like Google or Yahoo will use these algorithms to scan documents and attachments before sending them to the users' inboxes. Spam is also filtered into a separate folder, drawing the users' attention to its possible security risks.

Furthermore, spam emails may lay the foreground for additional network security attacks. Users who wish to visit a website enter their IP address into their browser. The computer then sends a packet containing the sender's access request to servers at the destination, which sends a packet back to the user’s computer. The amount of time for this execution is called a ping response, and sequentially, the execution is referred to as a ping command. However, this command can be a vulnerable source to internet security through the application of a denial-of-service attack (DoS). DoS attacks are among the most prevalent security attacks that cause the most destruction. (Yihunie et al., 2018). These attacks happen when a computer sends numerous pings or access requests to a server. DoS attacks typically utilize more than one computer, called distributed DoS (DDoS). These attacks are made with computers compromised or infected with malware. DDoS attacks are often executed using a trojan generated from spam emails. Attackers use malware to control multiple computers to attack the server. The attack consequently overwhelms the website's server, slowing response times or even crashing the server, rendering the legitimate user unable to access the website. DDoS attacks cost companies time and money to block attacks and allow legitimate users to regain access. All of this was enabled by a few spam emails that infected a couple of computers to cause a wave of destruction.

In conclusion, understanding network security helps users' privacy stay protected. A well-informed user will be more likely to identify spam emails that contain malware or phishing. Users will know that what looks like a standard email may redirect them to a phishing site. When following links in emails, users should check that the link is correct. Users should also change their password regularly. Consideration of a two-step authentication process to limit the possibility of stolen credentials is always recommended. Additionally, files attached to emails should be scanned for viruses before downloading. Users should check what security their email provider provides to assist in network security. Furthermore, antivirus software can assist in finding installed malware as it periodically scans all the computer’s files. These small tasks, if done regularly, will contribute to stopping more significant security attacks, such as DoS attacks. This will allow individual users and businesses the protection they desire in network security.


 

References

Singh Surinder Pal Singh, S. T., Gabhane, M. D., & Mahamuni, C. (2023). Study of Machine

Learning and Deep Learning Algorithms for the Detection of Email Spam Based on

Python Implementation. 2023 International Conference on Disruptive Technologies

(ICDT), Disruptive Technologies (ICDT), 2023 International Conference On, 637–642.

https://doi.org/10.1109/ICDT57929.2023.10150836

Vahid, F., & Lysecky, S. (2019). Computing technology for all. zyBooks.

Yihunie, F., Abdelfattah, E., & Odeh, A. (2018). Analysis of Ping of Death DoS and DDoS

Attacks. 2018 IEEE Long Island Systems, Applications and Technology Conference

(LISAT), Systems, Applications and Technology Conference (LISAT), 2018 IEEE Long Island, 1–4. https://doi.org/10.1109/LISAT.2018.8378010

Comments

Popular posts from this blog

Data Structure and Algorithm Design and Efficiency

Information Technology Careers

Newbie to Newbie - Java 101