Post #6: Network Security

 

Network Security

There are many ways that a computer can fail. Unfortunately, one of the more common failures is due to an intentional attack. These attacks commonly occur from outside and are conducted via a computer’s network connections. For this reason, network security is more important than ever. While there are many possible problems, this paper will focus specifically on security holes/vulnerabilities and phishing.

Security Holes and Vulnerabilities

With the looming threat of malicious attacks, many computers are built with security in mind. The textbook describes many of the threats and discusses computer security. “Computer security is the prevention of unauthorized computer access, including viewing, changing, or destroying a computer or data” (Vahid & Lysecky, 2019, sec. 8.1). Despite the large amount of effort put into making computers and networks more secure, security holes—vulnerabilities—still exist. “A security hole, or vulnerability, is an aspect of a computer that can be used to breach security” (Vahid & Lysecky, 2019, sec. 8.1). What is worse is that there are a whole host of people constantly probing networks to try to discover new vulnerabilities.

These continued attacks make creating a secure system a daunting task. There is a constant effort to close security holes and keep networks safe. Whenever a vulnerability is discovered developers work quickly to close it with an update. One of the best ways to keep a network secure is simply to keep it updated. “Thus, computer users are advised to keep their OS'es up-to-date, not only to gain new features, but to close security holes” (Vahid & Lysecky, 2019, sec. 8.1). A second recommendation be aware of, and regularly update, security and privacy options. As an example, a common source of in-home cameras being hacked, it turns out, is caused when users do not change the default password (Spadafora, 2021). Taking the time to set up basic security and privacy features can be an important step.

Phishing

These attacks can be serious. As early as 2006 the FBI did a survey of a handful of businesses to assess the cost of computer crimes. “The average cost per company was more than $24,000, with the total cost reaching $32 million for those surveyed” (Evers, 2006, para. 1). With that survey, the FBI estimated that the total cost for American businesses was almost $70 billion a year. However, the attacks above describe vulnerabilities in the system itself, but there is another weakness, the user. Authors Mahmoud Khonji, Youssef Iraqi, and Andrew Jones describe how hackers attack the user as a vulnerability. “PHISHING is a social engineering attack that aims at exploiting the weakness found in system processes as caused by system users” (Khonji et el. 2013, p. 2091). With a phishing attack, hackers do not need to find a vulnerability or guess a password, they trick the user into giving them access.

Users can protect against this type of breach by exercising caution. One approach is to never enter a password (or other information) into a page that was reached by clicking a link in an unsolicited email. Instead, if an email alerts a user to a problem with an account they have, the user should use their browser to navigate directly to that account’s website. Another recommendation would be to practice good password discipline. “Signing out regularly, changing passwords frequently, never writing a password (in a file, email, or paper), using different passwords for different sites, and using hard-to-guess passwords can improve account security” (Vahid & Lysecky, 2019, sec. 8.4). In this way, even if a password is compromised, the damage may be minimized.

Conclusion

There are certainly many more possible problems, but this paper looked specifically at security holes/vulnerabilities and phishing attacks. It may seem that these are highly technical problems and the solutions would be overwhelming to the novice user. However, the recommendations in this paper, to keep your OS updated, to set and maintain basic security and privacy settings, to never click on a link in an unsolicited email and then enter personal data (actually, never clicking a link in an unsolicited email at all is probably the best practice), and practicing good password discipline are easy steps that even the most basic user can achieve and benefit from.

References

Evers, J. (January 20, 2006). Computer crime costs $67 billion, FBI says; Dealing with viruses, spyware, PC theft and other digital crimes adds up to a hefty total for businesses. CNET. https://www.cnet.com/news/privacy/computer-crime-costs-67-billion-fbi-says/

Khonji, M. Iraqi, Y. Jones, A. (2013). Phishing detection: A literature survey. IEEE Communications Surveys & Tutorials, Vol. 15, No. 4, Fourth Quarter 2013. http://romisatriawahono.net/lecture/rm/survey/network%20security/Khonji%20-%20Phishing%20Detection%20-%202013.pdf

Spadafora, A. (April 20, 2021). Default passwords make IP cameras surprisingly easy to hack: Over 380,000 public-facing cameras have been discovered online. Techradar.pro. https://www.techradar.com/news/default-passwords-make-ip-cameras-surprisingly-easy-to-hack

Vahid, F., & Lysecky, S. (2019). Computing technology for all. zyBooks.

Comments