Wednesday, September 4, 2024

Computer Systems and Vulnerabilities

Leon Grier

TEC 101 Fundamentals of Informational Technology & Literacy

Professor Jimmie Flores

August 29, 2024


In today's digital age, the importance of information and system security has never been more critical. As individuals and organizations increasingly rely on digital platforms to store, manage, and transmit sensitive data, the risks associated with cyber threats have grown exponentially. Effective security measures are essential for safeguarding personal information, such as bank account details and social security numbers, which, if compromised, could lead to identity theft and significant financial loss (Vahid & Lysecky, 2019). For organizations, the stakes are equally high, as a security breach could expose confidential business data, disrupt critical operations, and result in severe financial and reputational damage. The interconnected nature of modern systems means that vulnerabilities in one area can have widespread consequences, underscoring the need for robust information and system security protocols.

Information and system security are crucial for protecting sensitive data for both individuals and organizations. For individuals, strong security helps keep personal information, like bank account details and social security numbers, safe from identity theft and financial loss (Vahid & Lysecky, 2019). For organizations, it protects important business data, customer information, and critical systems from being hacked or damaged. A security breach can lead to big financial losses, damage to the company’s reputation, and legal trouble.

Ping commands are usually used to check if a computer on a network is reachable. However, they can also be used for attacks. One type is the Ping of Death, where an attacker sends oversized or corrupted ping packets to a target system, causing it to crash. Another is the ICMP Flood Attack (or Smurf Attack), where an attacker sends a huge number of ping requests, overwhelming the target system and causing it to slow down or stop working (Vahid & Lysecky, 2019).

Security vulnerabilities are weaknesses in software or hardware that attackers can use to gain access to systems. For example, if software is not updated, it might have flaws that hackers can exploit to take control of a computer. A famous example is the WannaCry ransomware attack in 2017, which took advantage of a flaw in Windows operating systems. The attack spread quickly across networks, encrypting files and demanding a ransom to unlock them (Kaspersky, 2021).

These vulnerabilities exist because software might be outdated, misconfigured, or lacking necessary security updates. Hackers target these weaknesses to steal data or disrupt operations. The damage can be severe, including data loss, financial loss, and long periods where systems are down.

Computer viruses are harmful programs that can spread from one computer to another, often causing damage by deleting or corrupting data. A well-known virus is the ILOVEYOU virus from 2000, which spread through email and caused a lot of damage by overwriting files and spreading to other contacts (Smith, 2020).

Computers are vulnerable to viruses when users unknowingly download or open infected files, often from emails or untrustworthy websites. Once a virus is in the system, it can corrupt files, slow down the computer, and cause other problems.

When security is breached, you might notice your computer crashing, running slowly, or showing error messages. You might also see unauthorized changes to your system settings. The damage from these breaches can be serious, leading to data loss, financial theft, or a compromised computer. For businesses, this can also mean losing customer trust and facing legal penalties if they fail to protect sensitive information (Vahid & Lysecky, 2019).

To protect against vulnerabilities, it’s important to regularly updating software with the latest security patches helps fix vulnerabilities that hackers might exploit. Also, use firewalls and intrusion detection systems can help monitor and block unauthorized access to your computer or network (Vahid & Lysecky, 2019). To protect against viruses, you should antivirus programs can detect and remove viruses before they cause damage. Keeping this software updated is essential for protection against new threats. Furthermore, avoid opening suspicious emails, downloading files from untrustworthy sources, and always follow security guidelines to reduce the risk of infection (Smith, 2020).

By following these practices, individuals and organizations can reduce the risk of security breaches and keep their systems safe.

References

Kaspersky. (2021). What is WannaCry ransomware? How WannaCry works and how to remove it. Retrieved from https://www.kaspersky.com/resource-center/threats/ransomware-wannacry

Smith, S. (2020). The ILOVEYOU Virus: How one message destroyed the world. Retrieved from https://www.infosecurity-magazine.com/news-features/the-iloveyou-virus-20-years-on/

Vahid, F., & Lysecky, S. (2019). Computing Technology for All. Retrieved from https://learn.zybooks.com/zybook/TEC101:_Fundamentals_of_Information_Technology_&_Literacy_(TED2432A)

No comments:

Post a Comment

Connecting IT Careers to the Fundamentals of Information Technology

I n reflecting on the relationship between IT careers and the foundational concepts of information technology covered in TEC 101, it becomes...