The Vulnerabilities of Computer Systems
Introduction
Computer systems are exposed to various hazards when connected to the Internet and other networks. Threat actors are people who wish to steal information and damage networks (TestOut, 2024.). When bad guys take over a network, their sneaky fingers can get a hold of your personal info, and you could lose it forever. So, it’s super important to be careful and follow the rules of cybersecurity. These cyberattacks are constantly changing, so the bad guys are always coming up with new ways to steal your stuff. They easily manipulate the interconnected nature of the modern-day world by praying on unsuspecting individuals. Raising awareness about cyber threats and adhering to safe protocols makes you less likely to fall victim to cybercrimes. This paper explores various common cyber threats, such as ping flood attacks, malware infections, and phishing schemes, emphasizing the importance of cybersecurity awareness and best practices to safeguard against these digital dangers.
Ping Flood Attacks
Ping attacks target a computer's hardware. One type of ping attack is the denial of service attack (DoS). Denial of service attacks “overwhelms a system with ICMP packets” (WittCode, 2024). Internet control message protocols or ICMP packets are like echo requests that check if a computer is connected to you. (TestOut, 2024). Under a DoS attack, computers experience congestion and the possibility of a system crash because a threat actor overloads a victim's processor with ICMP packets (WittCode, 2024). Distributed denial of service (DDoS) attacks work similarly. DDoS attacks use multiple computers to target a single user or network (Steinberg, 2022). Hackers use sneaky malware that hides inside our computers, waiting to do bad things like cause DDoS attacks and other mischief (Steinberg, 2022). They do not need to own the computers. Unsuspecting users download the programs accidentally and never know they’ve installed malware on their devices (Steinberg, 2022). Ping attacks have reduced over the years because newer computers defend against them automatically (WittCode, 2024). Ping flood attacks exemplify the sensitivity of network devices. It’s not challenging to harm computers, but the challenge to defend them never ends.
Vulnerability to Malware
All around the world, people use computers to access documents and download applications. Being able to share information instantly plays a key role in modern communication. The downside is that sometimes, people come across files or websites containing vicious malware. “Malware or malicious software is an all-encompassing term for software that intentionally infects damage on its users” (Steinberg, 2022, p. 44). People unknowingly introduce malware into their devices by clicking links developed by hackers or not updating their computers (Steinberg, 2022; TestOut, 2024). Once malware downloads into a system, it can easily replicate and infect other computers (Steinberg, 2022; TestOut, 2024). Computer connectivity makes them vulnerable to malware because once one device is infected, it can spread to every device connected to a network. (Steinberg, 2022; TestOut, 2024). We must understand the risks we face when using the Internet. Then, learn everything we can to protect ourselves.
Vulnerability to Phishing and Smishing
Damages caused by Malware
Malware affects your computer's functionality and performance. Malware was developed as espionage software when people first made computers (TestOut, 2024). Over time, malware has evolved from spyware into malicious tools such as viruses, worms, and ransomware. Viruses need someone to download them before they can infect a computer (Steinberg, 2022; TestOut, 2024). They spread between devices quickly and make them function slowly (Steinberg, 2022; TestOut, 2024). When they enter your device viruses corrupt or delete your files permanently (Steinberg, 2022; TestOut, 2024). Worms do not need a host computer and do not need someone to download them onto their computer (Steinberg, 2022; TestOut, 2024). Worms enter networks through security weaknesses and outdated software (Steinberg, 2022; TestOut, 2024). Then, they replicate themselves and feed on broadband (Steinberg, 2022; TestOut, 2024). Since worms consume broadband, they make networks respond slowly. Ransomware enters our computers attached to viruses and locks us out of our devices until we pay some hacker our hard-earned cash! (Steinberg, 2022; TestOut, 2024). Malware has evolved to harm us in various ways. Once it gets into your device, it can mess with your files, slow down your internet, steal your money, and even spy on you.
Damages caused by Phishing
Phishing schemes can have serious repercussions for their victims. When people enter their personal information on fake websites, bad actors can commit various crimes, like stealing their identities, gaining access to their online accounts, and installing malware (Steinberg, 2022; TestOut, 2024). For example, CEOs can access their company’s sales records, payroll, and W-2 forms (Steinberg, 2022). If a CEO falls for a spear phishing attack, hackers can access all the company’s records. They can pretend to be the company, email other companies, and install malicious software on their servers (Steinberg, 2022). Poisoned web servers spread viruses through an infected website’s homepage, which infects users who visit the site (Steinberg, 2022). If a hacker ever accessed a Google server, they could upload a virus to the server. So, all users who visited the infected server that day would get a virus on their devices. Phishing schemes are everywhere; bad actors only need to trick one person to access a whole network. Knowing about phishing schemes helps people avoid the consequences.
Importance of Cybersecurity
Cybersecurity practices help users maintain their privacy and network functionality. Awareness of malware and phishing schemes decreases the likelihood that you will experience issues and data breaches (Steinberg, 2022; TestOut, 2024). Cybersecurity awareness is the largest we can take to prevent cyberattacks overall (Steinberg, 2022; TestOut, 2024). Keeping information safe is essential because, with our personal information, threat actors can harm our reputation or credit.
Did you know that between 2020 and 2023, the U.S. Department of Human Senior Management lost the personal information of over 7.8 million federal employees (Shawe & McAndrew, 2023)? Additionally, the U.S. does not have any prevention measures in place in case of a large-scale cyberattack (Shawe & McAndrew, 2023). Thus, we must acquire the necessary knowledge and skills to safeguard ourselves effectively. It’s possible to avoid becoming a victim of cyberattacks if we know what to look for, which will improve our nation’s security as a result.
Recommendations for Protecting Computer Systems
Learning about malware is the first step to preventing it from infecting your network. Education creates user caution and recommends practices for safe Internet usage. It’s also recommended that you keep all your software up to date (Steinberg, 2022; TestOut, 2024). Worms sneak into computers through old programs and other network holes. (Steinberg, 2022; TestOut, 2024). Also, only download applications and software directly from the software developer or an authorized vendor like Google and Apple (Steinberg, 2022; TestOut, 2024). Downloading software from third parties is an easy way for threat actors to infect systems with viruses and ransomware (Steinberg, 2022; TestOut, 2024). Taking preventive measures and staying informed about malware significantly reduces the chances of a cyberattack. Ensuring systems function properly without interruption.
Likewise, awareness of phishing attacks is the best defense against them. Do not click on emails requesting information, even if the email claims it’s a trusted source. Hackers impersonate family members and businesses, making it challenging to determine if someone is truly our friend (Steinberg, 2022; TestOut, 2024). If an email contains many grammatical mistakes, wants to send or receive money, and the user's email address seems unfamiliar, it’s probably a phishing attempt (Steinberg, 2022; TestOut, 2024). However, if there is a chance the email is legitimate, do not respond through email (TestOut, 2024). Contact the person or company directly on a secure line and ensure they sent the email (TestOut, 2024). People can reduce their risk of falling victim by staying vigilant and exercising precautions. Always maintain a degree of skepticism when receiving a text or email, and never willingly hand over private information to unauthorized persons.
Conclusion
References
Shawe, R., & McAndrew, I. (2023). Increasing threats to the United States of America's infrastructure based on cyber-attacks. Journal of Software Engineering and Applications, 16(10), p. 530-547. https://www.scirp.org/journal/paperinformation?paperid=128784
Steinberg, J. (2022). Cybersecurity. John Wiley & Sons, Inc. https://ebookcentral.proquest.com/lib/ashford-ebooks/detail.action?docID=6935204
TestOut Corp. (2024). CertMaster Learn Tech+. http://www.testout.com
WittCode. (2024). Ping of death attack. https://www.youtube.com/watch?v=PulyTbmAFfo
Comments
Post a Comment