About

Sunday, September 24, 2023



Post #6 - Network Security

Digital technology is widely used by both individuals and companies for communication, data storage, financial transactions, and other purposes. Threats and vulnerabilities that could jeopardize sensitive information and impair crucial systems are evolving along with technology. The security of your information and systems is crucial, whether you're a private person protecting your personal information or a major organization protecting significant assets.

Computer viruses are designed to interfere with systems. When a file is opened, computer viruses often attach to an executable host file, causing their viral coding to run. The associated software or document subsequently spreads the code via networks, disks, file-sharing applications, or corrupted email attachments. Fortinet. (n.d.)

Computers become vulnerable to viruses when operating systems and applications are not updated on a regular basis. Numerous viruses target obsolete software that has known flaws. Adware or unwanted programs may be the cause of unexpected pop-up adverts or windows that appear when using other software or while browsing the internet. A virus may leave you prone to data loss and identity theft.

Install trusted antivirus and anti-malware software on your computer to shield it against viruses. To make sure it can identify and get rid of the most recent dangers, keep it updated frequently. Also, never open email attachments from senders you don't know. If the email sounds dubious or requests that you enable macros, exercise extra caution.

Phishing is a form of social engineering assault that is frequently employed to obtain user information, such as login credentials and credit card details. It happens when an attacker deceives a victim into opening an email, instant message, or text message by disguising themselves as a reliable source. Imperva (2020) A computer is vulnerable to phishing attacks primarily because these attacks rely on social engineering and human psychology rather than technical flaws in the machine itself.

Human error and curiosity are the main targets of phishing. If they let their guard down for a second or fail to detect the telltale signals of a phishing effort, even cautious people occasionally fall prey to a well-planned phishing attack. To get people to act quickly, phishing messages frequently evoke a sense of urgency or terror. For instance, a message can threaten to suspend an account or warn of a security violation, pressing the user to act without hesitation.

Users must be cautious, practice good email and internet hygiene, and be aware of the typical phishers' tricks to reduce their susceptibility to phishing attempts. In addition to adopting security features like email filtering, use two-factor authentication (2FA), and up-to-date antivirus software to create an additional layer of defense. Also, education and awareness are crucial tools in the fight against phishing.

References

CyberGlossary guide and definitions | Fortinet. (n.d.). https://www.fortinet.com/resources/cyberglossary

What is phishing: Attack Techniques & Scam examples: Imperva. Learning Center. (2020, June 17). https://www.imperva.com/learn/application-security/phishing-attack-scam/#:~:text=Phishing%20is%20a%20type%20of,instant%20message%2C%20or%20text%20message.

No comments:

Post a Comment