Network Security
Three common methods of attacking
computer systems are denial of service attacks, phishing, and social
engineering. According to Deris, “Denial of service (DoS) is the most popular method used to
attack IoT networks, either by flooding services or crashing services.
Intrusion detection system (IDS) is one of the countermeasures for DoS
attack. “(Deris, 2021). Another common method is turning off responses to
ping requests when a network is at high risk. By allowing these types of
attacks to continue, network administrators risk the business usability of
their systems. Often, this is discovered by slowness in response. Customers
will complain that systems are unusable. In their testing of the impact of DDoS
attacks, Yihunie found that “The attacked server stopped responding after 45
minutes because of the severe impact of the DDoS attack on that server.“(Yihunie,
2018). This is not very long in the scale of things, and identifying it is
essential to keeping company systems available for real traffic.
Phishing
attacks are another reliable method for hackers to enter computer systems. By
subtly altering logs and links, hackers can convince employees that they are
responding to legitimate requests. Posing as company HR, popular subscription
services, or adding urgency to the request are great ways to motivate a user to
click on a link without inspecting it carefully.
Per Qahri-Saremi, “Social media
phishing attacks persist because people are prone to inattentively engage in
gratifying, tempting behaviors, such as engaging with messages from people they
do not know. “(Qahri-Saremi, 2023). With inboxes full, rushing through emails
to clear a worker’s plate for other assignments is common. This can expose the
company to creatively formatted requests where the user reveals confidential
information or security information. Ways to avoid these attacks include
validating that the links you will click on are typed correctly and validating
any request for urgent requests with the departments mentioned by the request.
Social
engineering is different from phishing, usually through direct communication
with employees. Salama states, “Social engineering is the art of fooling or manipulating
someone into giving their personal and sensitive information through a digital
environment.” (Salama, 2023). In this case, a common attack vector allows people
to enter passkey-locked doors when the people following the employee are
unknown. A social engineer will try to pass as a real employee, gaining
internal access to systems once they pass the doors. They will find network
access or unused workstations, giving them attack vectors to the company inside
network firewalls and systems, preventing external attackers from getting in. Looking
over a remote worker’s shoulder as they work in coffee shops or restaurants is
another vector where the heads-down employee can inadvertently provide
information the hacker would not normally access. Awareness is the key to employees
avoiding these types of problems. Not allowing unknown people to follow you
into the building should not be considered rude. A joking, “Can I see your
badge so I know you are not a spy?” can obviate any embarrassment of
challenging a fellow employee. Being attentive to the environment and not
accessing secure information in public places where it can be observed is the
worker's responsibility if remote access is allowed.
Comments
Post a Comment