Network Security - Business and Personal

 

            Network security is important not only for businesses and organizations, but for individuals, as well. According to Vahid & Lysecky, over 178 million records were exposed due to security breaches in 2017, roughly 1.5 billion data breaches, and the cost in the US caused by cybercrime in 2016 was 1.3 billion dollars. Cybercrimes pose a very real threat to companies and individuals across the world. Companies and individuals must practice safety when using the internet, like changing passwords frequently, installing firewalls for personal and business servers to block unwanted traffic, and using the least amount of information necessary when entering personal information online.

            Information travels throughout the world via networks. The internet is a global network of information. Using ping methods or trace routs, a user can follow the path of the packets of information across the network. The information leaves a footprint along the way through each point in the network, making the information vulnerable to cyberattacks from various points in the network (Vahid & Lysecky 8). If the network is vulnerable, this could cause security holes that allow malicious hackers to steal private information or hack accounts.

            Spam is a form of unsolicited information being sent to users in large quantities. Awati points out, though, that spam is often sent through botnets and not by actual humans (2023). Spam mail is usually sent out with financial motivation and intended to persuade readers to purchase goods or services. While most users delete spam, there is a small percentage of people that still follow through with the junk mail and will make a purchase.

            Phishing is another form of hacking, usually through email. However, as technology progresses scammers are using phone, video, and text-messaging to attempt to “phish” for information (Palmer 2023). Phishing generally entails tricking a user into entering their personal information, like logins and passwords, into a site that the user believes is a trustworthy website. Phishing can occur with large organizations and individuals, and everyone needs to be aware of what to look for when opening emails that are from unknown users.

            Checking for the name of the website in the address is one easy way to make sure that websites are legitimate. Hackers will often make spelling mistakes or errors. Also, if being asked to log in to an account, a user could go directly to the website themselves instead of using the link in the email. Phishing can be detrimental to someone’s personal information and should always be kept in mind when opening emails.

           



Awati, R., & Teravainen, T. (2023). What is Email Spam? TechTarget. Retrieved from                          https://www.techtarget.com/searchsecurity/definition/spam#:~:text=Email%20sp  am%2C%20also%20known%20as,a%20large%20list%20of%20recipients.

Palmer, D. (January 17, 2023). What is phishing? Everything You Need to Know to Protect          Against Scam Emails - and Worse. ZdNet. Retrieved from    https://www.zdnet.com/article/what- is-phishing-how-to-protect-yourself-from-            scam-emails-and-more/

Vahid, F., & Lysecky, S. (2019). Computing Technology for All. ZyBooks.

Comments

Popular posts from this blog

Employee Management System - Simple Project

Explicit and Implicit Variables

Creating Tables in MySQL