Post 6 - Network Security

 

The Importance of Information and System Security

Our personal and professional worlds rely heavily on computer systems, so information and systems security have become more critical than ever. Cybersecurity must be a priority not only for individuals but also for organizations of all sizes. Our personal and sensitive information, such as credit card and Social Security numbers, can be compromised without appropriate security measures. Personal data stored on individual computers, like passwords and private communications, are also susceptible to these kinds of attacks. This information can be exploited without consent, and the consequences of these types of breaches could include the loss of finances and reputation. Being able to understand threats is essential to developing effective defense strategies. In this discussion, I will focus on phishing and malware/ransomware to illustrate the severity and frequency of these cybersecurity threats worldwide.

Phishing

Phishing attacks exploit human vulnerabilities to gain unauthorized access to sensitive information due to their initial trust. These attacks are often delivered by deceptive emails, text messages (smishing), or fraudulent websites designed to appear legitimate. Attackers commonly attempt to deceive users into clicking malicious links or divulging confidential information such as login credentials or banking details. In many workplaces, IT and cybersecurity teams actively distribute simulated phishing emails to raise awareness and encourage employee vigilance. For instance, an employee might mistakenly respond to a fraudulent email disguised as a message from their supervisor, thereby compromising confidential company data. The consequences of a successful phishing attack may include unauthorized access to personal or corporate accounts, financial theft, and identity fraud.

Individuals can use numerous preventative measures to reduce the risk of phishing, and one of those steps is practicing caution before clicking links or opening attachments. Users should always check who an email is from and watch out for signs of a scam, like bad spelling or strange links. It is also good practice to use two-factor authentication (2FA). This defense adds an extra step, like a code sent to your phone, which I recommend rather than an email notification, so even if someone gets your password, they still cannot get into your account without that second code. Verification of email senders and remaining alert for common indicators of scams, such as spelling errors or suspicious links, are high priorities when preventing phishing. Implementing two-factor authentication (2FA) has also become a widely recommended security practice. In this method, an extra layer of protection is added due to the user needing a second verification code to access the information. According to the Federal Trade Commission (2023), phishing scams continue to be one of the top threats to consumers, with attackers becoming increasingly sophisticated in their attempts to mimic legitimate communications.

Malware and Ransomware

Malware is software developed to damage, disrupt, or gain unauthorized access to computer systems, services, or networks. Destructive malware can present a direct threat to an organization’s daily operations, impacting the availability of critical assets and data (Cybersecurity and Infrastructure Security Agency, 2022).  You will notice a system has been affected by malware may because it may become sluggish in performance, have unexpected error messages, or fail. Ransomware functions by encrypting a user's files or locking them out of their system, subsequently demanding payment in exchange for access. In ransomware incidents, access to vital files can be blocked entirely, with attackers demanding ransom payments under the threat of permanent data loss. There are several ways to defend against malware and ransomware. One way to protect against ransomware is to regularly back up your data so you can recover your system without paying hackers. It is also important to keep your software up to date since updates often fix security issues that criminals try to exploit. Cyber threats are always changing, so it is important to keep improving your defenses.

 

Computers are a big part of everyday life but can be vulnerable to attacks and steps need to be taken to protect information. This can be done by making sure everyone stays alert updating software when available, using two-factor authentication, and making sure to keep secure backups, users can significantly lower the risk of being hacked through proactive measures as they serve a critical defense strategy in the ongoing effort to protect digital assets and privacy from malicious actors.

--------------------------------------------------------------------------------------------------------------------

 References:

Cybersecurity and Infrastructure Security Agency. (2022). Ransomware guide. https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-057a

 

Federal Trade Commission. (2023). How to recognize and avoid phishing scams. https://consumer.ftc.gov/articles/how-recognize-and-avoid-phishing-scams


No comments:

Post a Comment