Skip to main content

Network Security

Individuals need information security to protect their important personal information from being stolen. They need system security to prevent harmful cyber attacks that hurt application programming or operating systems. There are many ways that your information and system security can be threatened and also many ways to protect it.

Malware is malicious software that runs on a computer causes it to do harmful things like running services that charge you or messing up your data. Ransomware is a type of malware that steals data and holds it requiring you to meet specific terms to regain access.

 It is important to regularly scan your computer for any malware. There may be important updates that patch any vulnerabilities. It is also smart to have back up data and being prepared in case of malware infection. One of the best ways to keep your information secure is through the use of antivirus software. 

“It primarily works by using a list of known virus patterns, called definitions or signatures. Another way it works is through heuristic identification. This means the software looks for actions or behaviors that are similar to what viruses do and tries to block those actions.” (TestOut Corp., 2024) 

Infections can spread through a network and onto different devices so it is important to activelymonitor across different devices on the network. Some other great ways to prevent a malware infection are “filtering to only allow file types you would expect to receive blocking websites that are known to be malicious, actively inspecting content, and using signatures to block known malicious code”. (NCSC,2020) Disconnecting from the internet may also be necessary in the case of a malware infection. 

 Social engineering refers to when someone manipulates another to get sensitive information by masquerading as something that they aren’t. There are different types of social engineering like phishing, baiting, tailgating, scareware, and dumpster diving. Some use hardware to transmit malware others use schemes like false alarms. Tailgating is “a physical breach where an unauthorized person manipulates their way into a restricted or employee only authorized area through the use of social engineering tactics.”(CMU, n.d) Multi-factor authentication is a great preventative measure that helps to ensure the wrong person isn’t trying to access your information. It’s important to safely guard sensitive files and verify any outside sources asking for that information. 

Awareness of what information should be securely guarded and who to allow access to that information is key. Antivirus software and safe communication practices, as well as routine monitoring of the activity in your network are essential for maintaining the security of your information and system.

References

Mitigating malware and ransomware attacks. (02/2020) https://www.ncsc.gov.uk/guidance/mitigating-malware-and-ransomware-attacks

Carnegie Mellon University. (n.d.). Social Engineering - Information Security Office - Computing Services - Carnegie Mellon University. https://www.cmu.edu/iso/aware/dont-take-the-bait/social-engineering.html

TestOut Corp. (2024). CertMaster Learn Tech+http://www.testout.com

Comments

Popular

Traveling Through a Network

The path for pinging the three websites all sent and received the same amount of packets without any loss. The path to Google was the quickest with an average roundtrip time of 85ms. The path to the Australian site, accountantsdaily.au, took the longest with an average round trip time of 285ms. The trace route to good took twenty four hops. For accountantsdaily.au it took twenty two. And the Chinese website that I chose, eggplantdigital.cn, was only sixteen hops. I noticed that the hops later in the route for each three site tended to be higher than the earlier ones. While Google had the highest amount of hops the average speed of those hops were faster than the other two sites. Eggplantdigital.cn had the lowest amount of hops with only sixteen. Geographic location is key to quicker routes. When pinging an IP address or domain that is far away it will take longer to complete. Pings and trace routes can help troubleshooting problems by pinpointing a location where communication is unabl...

Duolingo Critique

The app that I chose to review is Duolingo. There is a web version also. It is an interactive learning app that has many features. It can be accessed from multiple mobile devices like a tablet, laptop or phone. It can also be accessed with a pc. Functionality is seamless on all platforms. There is a database of learners with their information being stored for individual reference and each learner can connect with others through their profile. You can add friends and interact with others users. There are leaderboards that track progress daily on the app. This format is exciting because it makes the experience feel more like a game than educational lessons. There is a competitive factor and challenges that keep things interesting. Conversational exercises can be practiced in a more natural manner through an AI generated FaceTime call that reacts to your responses and stores your conversations. Stories are another way of practicing a language on the app. A pre generated radio program is a...