Network Security
The type of attack that can be executed using pings commands is commonly known as the ping of death. The ping of death is a form of denial-of-service attack, and this is when attackers crashes or freezes a computer by sending a ping larger than the Internet Protocol packet which is formed of 65,535 bytes. Most legacy computers cannot handle larger packets. When attackers violates the IP rule, it overwhelms the computers memory and causes it to crash, destabilize, or freeze. In order for organizations to avoid this type of attack, they will need to avoid using legacy equipment's and constantly update their software as they are the most vulnerable.
Computers systems are vulnerable to phishing threats because hackers gain access to sensitive data such as passwords or credit card details. Hackers achieve this by pretending to be someone else like a well-known company or authoritative figure via email, text message, or telephone and manipulate user's into giving up their data. Hackers also include links in phishing emails to have the user click on them which will install malware onto the user's computer. To protect a computer system or network from phishing threats, the user think before clicking on links that may seem suspicious or to good to be true. Also, to prevent this risk, the user should never give their personal information out and use anti-virus software.
References
KnowBe4. (n.d.). What is phishing? Phishing. Retrieved January 28, 2022, from https://www.phishing.org/what-is-phishing
Most common password cracking techniques hackers use. CyberNews. (2021, October 11). Retrieved January 28, 2022, from https://cybernews.com/best-password-managers/password-cracking-techniques/
What is a Ping of Death and ping of death attack? Fortinet. (n.d.). Retrieved January 28, 2022, from https://www.fortinet.com/resources/cyberglossary/ping-of-death
Comments
Post a Comment