Network Security
Network
Security
Miguel
Artache
The
University of Arizona Global Campus
TEC101:
Fundamentals of Information Technology and Literacy
Professor
Amr Elchouemi
May
24, 2022
Computer networks are the
backbone of our everyday lives. We interact with computers and networks daily
to shop, plan vacations, go to school, and do research. The Internet
superhighway allows everyone accesses to every piece of information available
on the Internet. The unfortunate part of the information superhighway is the malicious
activity by individuals or groups with a purpose. The basics of Ping is to tell
you if the destination is online and communicating. Network Administrators and
Ethical hackers use Ping for basic troubleshooting.
Ping packet floods from
multiple hosts can carry out distributed Denial of Service Attack (DDOS)
simultaneously. Here is an example. A hacking group wants to take down a
particular website because they disagree with their views. The hacking group
can coordinate hundreds of thousands of workstations infected with a virus to
assemble the infected computer in a botnet network. At the same time, the
botnet of infected computers ping flood the website’s web servers to get the
webserver to stop responding. Ultimately, the overload of packets takes the
webserver offline and makes it inaccessible to respond to legit HTTP GET
requests for the website.
Another type of ping
attack is the Ping of Death. The attacker floods to destination with large ICMP
packets without waiting for replies rendering the destination victim to go
offline—the Ping of Death as a type Distributed Denial of Service Attack. The
attacker used huge packets to take down the destination host.
Password cracking is a
significant threat to stealing data and compromising data systems in our
modern-day world. Hackers use brute force password dictionary attacks in which
they use software to mix alpha-numeric combinations and symbols to attempt to
gain access to an account or system for malicious purposes. System and security
administrators are implementing protections to safeguard against dictionary
attacks. One way that administrators do this is to place account lockout
policies on accounts. After a defined number of failed attempts, the account is
disabled, protecting the system from infiltration. Another way to prevent
access is by increasing password length and complexity. An organization with
complex passwords containing symbols, letters, numbers, and length allows
security administrators time to determine the nature of the attack due to
failed account attempts on authentication servers. Lastly, establish second
password authentication, such as duo requiring a pin after entering the password.
Security holes and
vulnerabilities occur when you have a lazy administrator—allowing devices on
your network that are not patched with the latest security vulnerabilities open
holes in the network where attackers can use the devices as a vector. A security
administrator must require any devices from vendors to have the latest patches
and adhere to the patching policies of the organization. Healthcare
organizations are notorious for lack of security hardening across the network
and devices. Another tool I enjoy is Cylance. Cylance monitors devices for
script execution in folders such as the Temp folder in windows. Attackers load
their payload to the Temp folder because there is no security in this folder.
When Cylance detects the attempt to execute, the file or files are quarantined
and removed.
Ping attacks, password
cracking, and security vulnerabilities have organizational impacts. These
impacts can sometimes take down organizations, resulting in loss revenue due to
a lack of security posters. Organizations worldwide are investing significant
amounts of money into Cyber security to protect their information data.
Comments
Post a Comment