Skip to main content

 Network Security

    There are several security threats to those that jump on any network even when it isn’t connected to the internet. The number of computing devices out there can all be targeted and if these threats are not checked the damage can be very costly. The threats to one’s network, devices, and even information come in many forms. These threats are serious but there are a few tried and true methods to help avert them. This paper will cover two specific threats in detail as well as outline some protective measures to help.

           One of the threats that are very popular in the cyberworld is called phishing. Phishing is a scam that runs on the internet to try to exploit a user’s sensitive information (Vahid & Lysecky, 2017). These types of threats are mainly targeted at a specific user of a device that can connect to a network or internet. Once a breach has happened the user’s information can be used to abuse that user's accounts whether it be money or just to use their accounts to exploit others. There are several ways to protect against these types of attacks and most of those ways come to the user being more diligent in the way one navigates a network. Making sure links are from a legitimate source is crucial before clicking on them and providing information. These methods are not always perfect because the ones trying to do the phishing can mimic real links confusing the user into following the link. There is also a new proposed system that can help use various methods of authentication as well as various steps that are taken between user and server to help lower the probability of phishing (Alzuwaini & Yassin, 2021). These are just some of the methods that a user can use to avoid being compromised by a phishing scam. Being diligent and cautious is going to be the real deterrent in these types of threats and it starts with the user.

           The other threat that can compromise a user or device is password cracking. This type of threat is set out to get a user’s credentials to gain access to accounts or devices that were not available before. Once a device or users’ information is accessible by the threat it is at the will of the attacker and can be used for nefarious reasons. Some measures can be taken to try to prevent these threats from taking place and the most obvious one is using a more secure password that is not easily crack. This is becoming harder as these threats become more sophisticated and even having end-to-end encryption can be compromised at times. There are companies out there that are trying to do away with passwords altogether and use other means of authenticating a user (Hrusak, 2021). A secondary authentication method is harder to replicate because it uses something that is carried by a user trying to access an account or device. Another method used is biometric authentication which requires a user to scan a body part to access the account or device. As technology advances so will the methods to protect devices and users from various attacks.

 

References

Alzuwaini, M. H., & Yassin, A. A. (2021). An Efficient Mechanism to Prevent the Phishing Attacks. Iraqi Journal for Electrical & Electronic Engineering17(1), 125–135. https://doi-org.proxy-library.ashford.edu/10.37917/ijeee.17.1.15

Hrusak, J. (2021, September 15). Microsoft Now Offers the Option to (Mostly) Ditch Your Password. ExtremeTech. https://www.extremetech.com/computing/327037-microsoft-now-offers-the-option-to-mostly-ditch-your-password

Vahid, F., & Lysecky, S. (2017). Computing technology for all. Retrieved from zybooks.zyante.com/


Comments

Popular posts from this blog

  Network Security Connection             Network security is very important in today’s world, and it will continue to be an essential part of the future of the cyber world. With each new technological advancement, there is a threat that arises that is set in motion to try and exploit that new technology. From the dawn of the first home computers, some seek to use those same systems with malicious intent. Cybercrime is the fastest-growing form of criminal activity (Vahid & Lysecky, 2017). The growing rate of cybercrime means there must be people at the forefront trying to protect against it and it starts with protecting networks as well as devices that are in use. Network security is a cornerstone to any computer database and this security needs to stay prepared for any cyber threat that will try to take advantage of its users.            Having a reliable network requir...