Universally, computer
systems are vulnerable to many types of threats. Security incidents such as application
vulnerabilities, viruses, Email spam, phishing attacks, password cracking, and social
engineering ploys can wreak havoc on individual computer programs, systems, or
entire networks of servers, resulting in data theft, file corruption, and even complete
loss of usability.
Significant
damage can be done even using simple ping commands to shut down entire servers.
One cyber security company, Cyphere, describes how a distributed
denial-of-service attack (DDOS) using ping commands from multiple computers can
bring down entire networks by disrupting a website’s availability, oftentimes
simultaneously infecting a network with viruses at the same time. The article and linked video explain that these
attacks often aim to extort money, take out competitors, or even just as a
training platform for hackers to fine-tune their capabilities. (Mirza)
While
many methods can be used to help reduce the risk of ping attacks and other security
risks, all threats cannot be eliminated entirely. Users need to be aware of
potential threats that can have a burdensome impact on not only their individual
computer systems but their entire lives. Let us examine the impacts and risk
reduction techniques of viruses and social engineering in more depth.
For
many reasons, systems are vulnerable to viruses, social engineering, and other
threats. Applications on a computer may allow outside hackers in through
backdoor methods where a hacker may release a virus or steal metadata from any
number of files. Humans trust by nature and often believe they have anonymity
or privacy when dealing with online websites, third-party applications, free
games, and/or email. Many users are unaware of their privacy settings and
believe all transactions or messages must be secure if they are within a
firewall. However, no firewall, network, or antivirus software can protect
against all threats. (Vahid, 2019)
Viruses
can be introduced to a computer through different methods and are often
embedded in other programs and applications. For example, a user installs a new
program to edit digital images and unknowingly installs a virus simultaneously.
They may never know this is installed and performing some task. A CSO article
by Josh Fruhlinger explains, “This malicious software tries to do its damage in
the background while your computer still limps along.” (Furlinger, 2022). He describes
how the “virus” may spread via email or the direct installation of new
software. This article and the course
text state that antivirus software is the most widely known product to help
protect against all types of malware (malicious software), including viruses. These
antivirus packages keep a repository of virus signatures to help identify and
then quarantine or restrict access to common viruses and malware.
While
antivirus software can reduce the risk of commonly known viruses, social
engineering tactics like phishing are currently a bigger security threat. Writer
for CNET, Elinor Mills, interviewed former jailed hacker Kevin Mitnick, and he “knows
the weakest link in any security system is the person holding the information.”
(Mills, 2008) Hackers use social engineering techniques to gain information and
insights into the systems directly from the sources. Phishing is just one
example of social engineering where emails ask “users to provide sensitive account
information by posing a legitimate companies.” (Vahid, 2019).
Recognizing and verifying senders before responding to or clicking on any emailed attachments or links is the easiest protection method against social engineering schemes. The most sensitive information should be restricted to in-person confirmation. When in-person meetings are not available, then additional security methods must be used to make sure any private information is only available to others for legitimate purposes.
References
Fruhlinger, J. (2022, April 28). Computer viruses
explained: Definition, types, and examples. CSO. Retrieved September 24,
2023, from
Mills, E. (2008, July 21). Social Engineering 101:
Mitnick and other hackers show how it's done. CNET. Retrieved September 24,
2023, from
Mirza, S. (n.d.). Ping Flood Attacks. The
Cyphere. Retrieved September 22, 2023, from
https://thecyphere.com/blog/ping-flood-attacks/
Vahid, F., & Lysecky, R. (2019). Computing
technology for all. zyBooks.



