Many aspects of our daily lives and business are now heavily dependent on digital technology. Hence, the element of information and system security has become crucial in today’s life. Our personal information and essential data must be well-protected to maintain our privacy and gain public trust. Information and system security are also crucial to guarantee the sustainability of our business. With the rapid development of technology, computer systems are being exposed to many forms of cyberattacks. The impact of cyber-attacks can result in significant financial losses, reputational damage, and legal consequences. Therefore, we need to identify threats and implement the necessary measures to secure our digital environment.
A ping-based attack is a type of network attack that utilizes the ICMP protocol. An ICMP flood attack sends echo request packets in large quantities to cause a Denial of Service (DoS) on the victim system. Such an attack is also referred to as a ping flood or ICMP flood. A Smurf attack is another type of ICMP attack that involves sending a large number of spoofed ping request packets to a broadcast IP address, replacing the victim IP with the source IP. Because many systems reply to the victim at roughly the same time, the victim system is bombarded with an overwhelming amount of data. This is another type of DOS attack. An attack that sends a large ICMP packet, known as a Ping of Death, fills the system's memory buffer. When the system attempts to process the packet, it crashes due to a buffer overflow. Such attacks are very rare these days because most systems are patched and up to date. Ping sweeps are a form of ping-based attack that is used in the reconnaissance phase of a network attack. Ping sweeps can discover active hosts and list all the active IP addresses. ICMP tunneling is a type of ping-based attack in which an attacker sends information through ICMP packets. Such an attack is often used to exfiltrate data back to attackers or to use the channel for command-and-control communication.
Malware and ransomware are among the many threats we hear
about in computer system security. Malware is malicious software that is
injected into a computer system to cause harm. Ransomware is a type of malware that
encrypts files and data on a computer and demands a ransom in exchange for the
decryption key, allowing users to regain access to their files and data. A
computer system can be compromised due to several factors, such as having
unpatched applications, outdated operating systems, and the users’ careless
actions, such as clicking on suspicious links or downloading suspicious
attachments or files. Some common symptoms of a malware or ransomware attack on
a computer system include slowness, unauthorized access to sensitive
information, corrupted files, and ransomware that locks the user out by
encrypting all critical files and data. Malware and ransomware attacks on
computer systems can have a significant impact on businesses and incur
substantial costs to restore data and systems to normal. To combat and prevent
malware and ransomware attacks on computer systems, it is highly recommended
that systems, applications, and operating systems be regularly updated and
patched. Keeping the latest versions of operating systems, applications, and
software updates can help prevent exploitation of known vulnerabilities. Having
a reliable, up-to-date antivirus and an anti-ransomware application that
performs real-time scanning and detection using heuristic methods can also serve
as a countermeasure against malware and ransomware attacks. The network
topology can also be enhanced by segmenting it to secure systems. In the event
of a malware attack on a single system, this feature can help prevent it from spreading to other systems on the network. Having
an offline backup of the system can also help prevent a ransomware attack from
causing significant damage.
Phishing and smishing attacks are significant cyber threats
to many systems and often exploit human factors rather than technical
weaknesses. Phishing is when a person sends a fake email to elicit a response,
such as asking for passwords or prompting a click on a malicious link. Smishing
is similar but targets mobile devices and uses the Short Message Service (SMS)
part of the network to send a malicious text message. All social engineering
attacks rely on people doing something, which is why a lack of user awareness
and knowledge can leave your system exposed to a wide range of attacks.
Phishing and smishing attacks can compromise your accounts, lead to identity
theft, result in fraud of all types, and compromise the systems you are trying
to protect. A few indicators that you may have been targeted with a phishing or
smishing attack include unusual or suspicious-looking emails or SMS messages,
acting strangely towards the systems you are trying to protect, and unusual
account behavior. Training your users is an excellent countermeasure against
the social engineering tactics associated with phishing and smishing. This
includes training on the common types of phishing attacks and potentially using
a training tool to send “mock” phishing emails to your users to test whether
they fall for a socially engineered attack. The more “attacks” that your users
receive, the more they are likely to catch suspicious emails and SMS messages
that would otherwise have been successful phishing or smishing attacks. In
addition to training your users, another excellent countermeasure to implement
to mitigate phishing and smishing attacks is multifactor authentication.
Multifactor authentication (MFA) (also known as two-factor authentication, 2FA)
provides a second authentication step, in addition to something that the user
knows, such as a password, PIN, or pattern, and instead requires something else
to gain access to your systems, networks, and applications. Typically, these
are something you know, something you have, something you are, or something you
do. Examples of the second factor in each category include: - Something you
have: Token, smart card, USB key, or mobile device - Something you are:
Fingerprint or facial recognition information - Something you do: A one-time
code sent to your mobile device, or completing a puzzle related to a current
event in your organization. Anti-phishing email and SMS filters are a good way
to help stop these types of attacks. Email filters can catch phishing emails before
they reach your users, preventing them from ever reaching your users. In
contrast, SMS filters can detect SMS attacks on the mobile network,
intercepting malicious messages before they reach your users.
Malware, ransomware, phishing, and smishing are just a few
of the many methods used by hackers in the never-ending battle to find and
exploit weaknesses in operating systems and applications to invade our computer
systems through social engineering traps. Once we understand how an attack is
carried out and can identify the warning signs, we can use tools such as
updates and anti-malware software, as well as educational resources and
multi-factor authentication, to limit the effects of a possible attack. The war
is not, however, over. Our vigilance and ongoing response to threats must never
cease if we want to ensure our information security and, therefore, have
confidence in technology.

Comments
Post a Comment