Individuals and organizations are concerned about computer system security (SS). Kotenko (2021) explains that preparing for and preventing cyberattacks is necessary to avoid lost time and money in repairing networks or downtime from slowed or stopped networks. Most of the time is spent creating patches to fix known attacks. He explains that very complex algorithms can help detect known and unknown potential threats. Although not all threats can be stopped, SS is the best way currently to fight the war on cybercrime (P 1-8). Some of the tools used by IT Professionals are abused by criminals using ping commands.
Internet Control Message Protocol (ICMP) is ordinarily
great for finding out where errors exist inside and outside of a network;
However, according to Jenashankar (2021), hackers utilize ICMP attacks for
selfish and harmful means (P 1-2). Jenashankar (2021) describes the types of
ICMP attacks: “ICMP Tunneling, ICMP Router Discovery, Smurf attack, Fraggle
Attack, ICMP flood attack, Ping of death attack, Information Gathering, Trace
Route, Port Scan, OS fingerprinting, Teardrop.” (P 3). These tools that were
used for good are turned into cyber weapons by attacking the system
infrastructure in different ways. Jenashankar (2021) explains that a Teardrop
utilizes the IP packet sent in separate segments to create a DOS attack. It
uses over-lapping IP fragments that prevent the device from putting the pieces
back together and can cause the device to crash (P 4). Using blocking technics
can prevent some of these attacks but may cause problems with normal
operations. Deciding the best SS measures to implement is vital for
productivity and protection.
A network is yet to be created without security holes or
vulnerabilities. Operating systems, applications, and programs need to be used
as intended. Tools can be used as weapons also, and creating security locks and
combinations can help keep the honest user honest. Access to tools is needed,
and front and back doors are standard for updates and usability. Togay (2022)
explains that one of the best methods for securing and filtering is a strong
firewall policy. Creating a firewall with rules that stop harmful packets from
damaging or slowing down everyday user experience is needed. The ideal
protection allows the authorized users, impervious to attacks, to see
everything coming and going before it hits critical systems (P 2). Making sure
firewall settings and other security mechanisms are adequately set at home and
in the workplace will hopefully keep unwanted perpetrators from their dirty
deeds.
Another critical step to prevent harm is using strong
passwords and 2-factor authentication technics. Vahid (2017) explains that many
sites use two-step verification to access accounts to keep harmful users having
access (Section 8.3.2). Text codes are becoming popular on many online applications
and website access.
Figure 1 Password and phone unlock features
Any lock or password can be discovered if the right
attacks, tools, or methods are used. I have had people come to me with their
computers locked out because they forgot their passwords. Password cracking
tools was created for retrieving those lost passwords. I have bought a cheap used
$ 15.00 desktop PC from a thrift store that had a hard drive that was loose. I
opened the tower of the PC pushed the harddrive back into place, and started up
the computer, and the user login came up. I shut down the PC and inserted a
downloaded free password cracking software, and within minutes reset the user
password to a new password. I deleted all the user’s information, but hackers
could use abandoned hardware to recover data. I recommend using the safe
removal of information when reselling old information systems. Liu (2019) shows
the methods used in password cracking software. Some companies have implemented
password rules based on ease of discovery by these brute-force software
technics. Many websites force users to use hard unnormal passwords; however,
research has shown passwords can be cracked given enough time and access (P
1-18). There are many creative ways to prevent password cracking software, and
two-factor authentication is one excellent method. We can reduce the chances
for attackers by making our systems challenging. Hackers look for easy
vulnerable targets. Security is essential for everyone’s safety in the
workplace and at home. Everyone must make an effort to fight against the
cyberwars around us.
References
Ipoxo.com (2022) How does the USB-Key work? Retrieved from https://ipoxo.com/
Jenashankar,
A. (2021 August 24) ICMP Attacks – Types & Codes For Log Analysis,
Detection & Defense. Retrieved from https://www.socinvestigation.com/icmp-attacks-types-codes-for-log-analysis-detection-defense/
Kotenko,
I., Saenko, I., Lauta, O., & Karpov, M. (2021). Situational Control of a
Computer Network Security System in Conditions of Cyber Attacks. 2021
14th International Conference on Security of Information and Networks (SIN),
Security of Information and Networks (SIN), 2021 14th International Conference
On, 1, 1–8. https://doi.org/10.1109/SIN54109.2021.9699368
Liu,
E., Nakanishi, A., Golla, M., Cash, D., & Ur, B. (2019). Reasoning
Analytically about Password-Cracking Software. 2019 IEEE Symposium on
Security and Privacy (SP), Security and Privacy (SP), 2019 IEEE Symposium On,
380–397. https://doi.org/10.1109/SP.2019.00070
Togay,
C., Kasif, A., Catal, C., & Tekinerdogan, B. (2022). A Firewall Policy
Anomaly Detection Framework for Reliable Network Security. IEEE
Transactions on Reliability, 71(1), 339–347.
https://doi.org/10.1109/TR.2021.3089511
Vahid,
F., & Lysecky, S. (2017). Computing
technology for all. Retrieved from zybooks.zyante.com/