Wednesday, April 13, 2022

Network Security for Individuals & Organizations

             Individuals and organizations are concerned about computer system security (SS). Kotenko (2021) explains that preparing for and preventing cyberattacks is necessary to avoid lost time and money in repairing networks or downtime from slowed or stopped networks. Most of the time is spent creating patches to fix known attacks. He explains that very complex algorithms can help detect known and unknown potential threats. Although not all threats can be stopped, SS is the best way currently to fight the war on cybercrime (P 1-8). Some of the tools used by IT Professionals are abused by criminals using ping commands.

            Internet Control Message Protocol (ICMP) is ordinarily great for finding out where errors exist inside and outside of a network; However, according to Jenashankar (2021), hackers utilize ICMP attacks for selfish and harmful means (P 1-2). Jenashankar (2021) describes the types of ICMP attacks: “ICMP Tunneling, ICMP Router Discovery, Smurf attack, Fraggle Attack, ICMP flood attack, Ping of death attack, Information Gathering, Trace Route, Port Scan, OS fingerprinting, Teardrop.” (P 3). These tools that were used for good are turned into cyber weapons by attacking the system infrastructure in different ways. Jenashankar (2021) explains that a Teardrop utilizes the IP packet sent in separate segments to create a DOS attack. It uses over-lapping IP fragments that prevent the device from putting the pieces back together and can cause the device to crash (P 4). Using blocking technics can prevent some of these attacks but may cause problems with normal operations. Deciding the best SS measures to implement is vital for productivity and protection.

            A network is yet to be created without security holes or vulnerabilities. Operating systems, applications, and programs need to be used as intended. Tools can be used as weapons also, and creating security locks and combinations can help keep the honest user honest. Access to tools is needed, and front and back doors are standard for updates and usability. Togay (2022) explains that one of the best methods for securing and filtering is a strong firewall policy. Creating a firewall with rules that stop harmful packets from damaging or slowing down everyday user experience is needed. The ideal protection allows the authorized users, impervious to attacks, to see everything coming and going before it hits critical systems (P 2). Making sure firewall settings and other security mechanisms are adequately set at home and in the workplace will hopefully keep unwanted perpetrators from their dirty deeds.

            Another critical step to prevent harm is using strong passwords and 2-factor authentication technics. Vahid (2017) explains that many sites use two-step verification to access accounts to keep harmful users having access (Section 8.3.2). Text codes are becoming popular on many online applications and website access.

                            Figure 1 Password and phone unlock features


            Any lock or password can be discovered if the right attacks, tools, or methods are used. I have had people come to me with their computers locked out because they forgot their passwords. Password cracking tools was created for retrieving those lost passwords. I have bought a cheap used $ 15.00 desktop PC from a thrift store that had a hard drive that was loose. I opened the tower of the PC pushed the harddrive back into place, and started up the computer, and the user login came up. I shut down the PC and inserted a downloaded free password cracking software, and within minutes reset the user password to a new password. I deleted all the user’s information, but hackers could use abandoned hardware to recover data. I recommend using the safe removal of information when reselling old information systems. Liu (2019) shows the methods used in password cracking software. Some companies have implemented password rules based on ease of discovery by these brute-force software technics. Many websites force users to use hard unnormal passwords; however, research has shown passwords can be cracked given enough time and access (P 1-18). There are many creative ways to prevent password cracking software, and two-factor authentication is one excellent method. We can reduce the chances for attackers by making our systems challenging. Hackers look for easy vulnerable targets. Security is essential for everyone’s safety in the workplace and at home. Everyone must make an effort to fight against the cyberwars around us.

 

 


 

References

 Ipoxo.com (2022) How does the USB-Key work? Retrieved from https://ipoxo.com/

Jenashankar, A. (2021 August 24) ICMP Attacks – Types & Codes For Log Analysis, Detection & Defense. Retrieved from https://www.socinvestigation.com/icmp-attacks-types-codes-for-log-analysis-detection-defense/

Kotenko, I., Saenko, I., Lauta, O., & Karpov, M. (2021). Situational Control of a Computer Network Security System in Conditions of Cyber Attacks. 2021 14th International Conference on Security of Information and Networks (SIN), Security of Information and Networks (SIN), 2021 14th International Conference On1, 1–8. https://doi.org/10.1109/SIN54109.2021.9699368

Liu, E., Nakanishi, A., Golla, M., Cash, D., & Ur, B. (2019). Reasoning Analytically about Password-Cracking Software. 2019 IEEE Symposium on Security and Privacy (SP), Security and Privacy (SP), 2019 IEEE Symposium On, 380–397. https://doi.org/10.1109/SP.2019.00070

Togay, C., Kasif, A., Catal, C., & Tekinerdogan, B. (2022). A Firewall Policy Anomaly Detection Framework for Reliable Network Security. IEEE Transactions on Reliability71(1), 339–347. https://doi.org/10.1109/TR.2021.3089511

Vahid, F., & Lysecky, S. (2017). Computing technology for all. Retrieved from zybooks.zyante.com/

CPT 307 Week 5 Newbie to Newbie

Applying algorithmic design and data structure techniques creating structured programs   https://www.prepbytes.com/summer-programs/master-...