Network Security - Business and Personal
Network
security is important not only for businesses and organizations, but for
individuals, as well. According to Vahid & Lysecky, over 178 million
records were exposed due to security breaches in 2017, roughly 1.5 billion data
breaches, and the cost in the US caused by cybercrime in 2016 was 1.3 billion
dollars. Cybercrimes pose a very real threat to companies and individuals
across the world. Companies and individuals must practice safety when using the
internet, like changing passwords frequently, installing firewalls for personal
and business servers to block unwanted traffic, and using the least amount of
information necessary when entering personal information online.
Information
travels throughout the world via networks. The internet is a global network of
information. Using ping methods or trace routs, a user can follow the path of
the packets of information across the network. The information leaves a
footprint along the way through each point in the network, making the
information vulnerable to cyberattacks from various points in the network (Vahid
& Lysecky 8). If the network is vulnerable, this could cause security holes
that allow malicious hackers to steal private information or hack accounts.
Spam
is a form of unsolicited information being sent to users in large quantities.
Awati points out, though, that spam is often sent through botnets and not by
actual humans (2023). Spam mail is usually sent out with financial motivation
and intended to persuade readers to purchase goods or services. While most
users delete spam, there is a small percentage of people that still follow
through with the junk mail and will make a purchase.
Phishing
is another form of hacking, usually through email. However, as technology
progresses scammers are using phone, video, and text-messaging to attempt to
“phish” for information (Palmer 2023). Phishing generally entails tricking a
user into entering their personal information, like logins and passwords, into
a site that the user believes is a trustworthy website. Phishing can occur with
large organizations and individuals, and everyone needs to be aware of what to
look for when opening emails that are from unknown users.
Checking
for the name of the website in the address is one easy way to make sure that
websites are legitimate. Hackers will often make spelling mistakes or errors.
Also, if being asked to log in to an account, a user could go directly to the
website themselves instead of using the link in the email. Phishing can be
detrimental to someone’s personal information and should always be kept in mind
when opening emails.
Awati, R., & Teravainen, T. (2023).
What is Email Spam? TechTarget. Retrieved from https://www.techtarget.com/searchsecurity/definition/spam#:~:text=Email%20sp am%2C%20also%20known%20as,a%20large%20list%20of%20recipients.
Palmer, D. (January 17, 2023). What
is phishing? Everything You Need to Know to Protect Against Scam Emails - and Worse. ZdNet. Retrieved from https://www.zdnet.com/article/what- is-phishing-how-to-protect-yourself-from- scam-emails-and-more/
Vahid, F., & Lysecky, S.
(2019). Computing Technology for All. ZyBooks.
Comments
Post a Comment