Post #6 - Network Security

 





Protecting People and Systems....


In today’s connected world, network security is essential for both individuals and organizations. We rely on computers and mobile devices to store personal data, run businesses, and communicate online. Without proper security, sensitive information like passwords, financial records, and customer data can be stolen or misused.

One tool I’ve used in this course is the ping command, which helps test if a device or website is reachable. While ping is useful for troubleshooting, it can also be misused. Hackers may use ping for network reconnaissance, scanning systems to find active devices before launching an attack. Ping can also be used in Denial-of-Service (DoS) attacks, where attackers flood a system with requests to slow it down or crash it.

Beyond ping-based threats, I focused on two major security risks: phishing and smishing. These attacks target people directly and are becoming more common as we rely on email and mobile communication.


Phishing Attacks

Phishing is a cyberattack where scammers send fake emails that look real. These messages often pretend to be from banks, delivery companies, or coworkers. They trick people into clicking links, downloading files, or entering personal information.

According to Ghazi-Tehrani and Pontell (2021), phishing has evolved from simple mass emails to more targeted attacks like spear phishing and business email compromise (BEC). These scams are responsible for billions in financial losses and are often the first step in ransomware attacks.


Why systems are vulnerable:

Phishing works because it targets human behavior. People may not recognize a fake email, especially if it looks urgent or familiar. Even secure systems can be compromised if a user clicks the wrong link.


Symptoms and damage:

  • Fake login pages that can steal credentials.
  • Malware infections can come from attachments.
  • Potential unauthorized access to accounts or networks.


How to defend against Phishing attacks:

  1. Start using spam filters and antivirus software.
  2. Begin to train users on how to spot suspicious emails.
  3. Implement two-factor authentication method.
  4. Be sure to verify requests before clicking links or sharing information.


Smishing Attacks

Smishing is similar to phishing but happens through text messages (SMS). Attackers send fake texts pretending to be from banks, delivery services, or tech support. These messages include links or phone numbers and ask you to act quickly.

Ghazi-Tehrani and Pontell (2021) note that smishing is growing rapidly because it bypasses email filters and reaches users directly on their phones.

Why systems are vulnerable:

Mobile devices are often less protected than computers. People trust texts more than emails and may click without thinking


Symptoms and damage:

  • Messages claiming your account is locked or vulnerable.
  • Multiple links that install malware or steal data.
  • Unauthorized access to apps and cloud accounts.
  • Business data can be leaked if employees don't resist the scam.

How to Defend against Smishing:

  1. Do not click links in suspicious texts.
  2. Be sure to block unknown senders and report any scams.
  3. Utilize your mobile security apps.
  4. Please educate staff members on mobile threats and safe practices.

My Final Thoughts...

Phishing and smishing attacks are dangerous because they target people and not just machines. That’s why network security must include education, strong tools, and smart habits. Whether it’s blocking ping scans, spotting fake messages, or using secure passwords, every step helps protect our systems.

As Connolly et al. (2020) explain, organizations are especially vulnerable when they lack proper training and layered defenses. Their study on ransomware shows that human error and weak security practices often open the door to major breaches.

As I continue studying cybersecurity, I’m learning how to defend both personal and business networks. My goal is to help others stay safe in a connected world because security isn’t just about technology. It’s about trust.






References:

Ghazi-Tehrani, A. K., & Pontell, H. N. (2021). Phishing evolves: Analyzing the enduring cybercrime. Victims & Offenders, 16(3), 316–342.

Connolly, L. Y., Wall, D. S., Lang, M., & Oddson, B. (2020). An empirical study of ransomware attacks on organizations: An assessment of severity and salient factors affecting vulnerability. Journal of Cybersecurity, 6(1).

Comments

Popular posts from this blog

Post #2 – My Review of the Samsung Health App

From Pest to Protect: About Me

Post #1- " A Programmer in the Making"