Nowadays,
protecting our information and data has become increasingly more challenging
and complex, especially with advancements in technology such as the internet
and social media. Dan Farmer, an author of various security programs and Distinguished
Engineer at Mercedes-Benz R&D, once said, “If security were all that
mattered, computers would never be turned on, let alone hooked into a network
with literally millions of potential intruders” (Quotefancy, n.d.). Hence, companies
are at risk every day their computers remain connected while their users access
information and media online.
Attacking
computers to expose security risks or other malicious intent can be
accomplished through many different methods. One such tool is ping, a
utility that sends a signal to another computer across a network, and in return,
provides back a response. However, attackers can use this seemingly innocuous
tool to perform a form of denial-of-service (DoS) attack, which shuts down a
computer or network and prevents users from accessing the resource. Attackers
accomplish this by sending ping packets to a target machine with more than the
maximum allowable packet size of 65,535 bytes, causing unpatched or legacy
systems to crash and become inaccessible (Fortinet, n.d., How Does the Ping of
Death Work section, para. 1). Therefore, companies should deploy security
defenses to prevent such attacks by keeping their systems up-to-date with the
latest security patches or deploying other safeguards.
Companies
must also train their employees from user-oriented attacks. Social engineering
attacks such as phishing and baiting are techniques used by attackers to
manipulate users into disclosing information, which is often private and
sensitive. For example, in a phishing attempt, attackers send an email that
compels users to click on an embedded malicious link(s). According to Alzuwaini
and Yassin (2021), “[p]hishing is a type of cybersecurity attacks [sic]
employed to steal user’s sensitive data like passwords, social security number,
credit card numbers, login credentials” (p. 125). In 2014, Sony Pictures became
a victim of such an attack where “hackers gained access to the company’s
network, stole confidential data, threatened executives and employees, and
rendered thousands of computers inoperable” (Ranger, 2018, para. 5). Baiting is
another social engineering technique that entices users by placing something of
interest in front of a user to lure them into providing credentials, such as a
free USB device. Moreover, these devices contain malicious code that can also
spread to other computers on the network. Thus, companies must be vigilant
in training their users to distinguish between genuine or malicious emails and
knowing when an offer may be too good to be true.
As
the world becomes ever so connected through technology, attacks will always be
prevalent and evolve to more sophisticated techniques. Companies can protect
their information, one of their most valuable assets, from attackers by
applying the latest security updates to their systems or deploying other
cybersecurity defenses such as antivirus software and firewalls. Social
engineering attacks include a broad range of malicious techniques that leverage
human interaction to entice users into disclosing private and sensitive data
such as passwords or credit card data. Preventing social engineering attacks
require various methods, including training users and stronger authentication
mechanisms. Although it is unrealistic for companies to keep their computers
from being connected to a network or preventing their employees from accessing the
internet, a successful cybersecurity strategy can help companies protect
themselves and their customers.
References
Alzuwaini,
M. H., & Yassin, A. A. (2021). An efficient mechanism to prevent the phishing
attacks. Iraqi Journal for Electrical & Electronic Engineering, 17(1),
125–135. https://doi-org.proxy-library.ashford.edu/10.37917/ijeee.17.1.15
Fortinet.
(n.d.). Ping of death. https://www.fortinet.com/resources/cyberglossary/ping-of-death
Quotefancy.
(n.d.). Quote by Dan Farmer: If security were all that mattered,
computers would never be turned on, let alone hooked into a network with
literally millions of potential intruders. https://quotefancy.com/quote/1642723/Dan-Farmer-If-security-were-all-that-mattered-computers-would-never-be-turned-on-let
Ranger,
S. (2018, September 7). Phishing alert: North Korea’s hacking attacks shows
your email is still the weakest link. ZDNet. https://www.zdnet.com/article/phishing-alert-north-korean-hacking-attacks-shows-your-email-is-still-the-weakest-link/
Comments
Post a Comment