Network Security is major part of today’s IT world. Hardware, the computers operating systems, databases and computer applications are just some of the essential components of information technology fundamentals. These components are not impenetrable, that’s where network security comes into play. It is the digital security guard for the computer and all of these components that is preventing unauthorized access to data that’s stored on your computer. Pictures, email addresses, passwords and bank account information are targets that a hacker might want to obtain and having proper network security will aid in the protection of those assets. Information Technology Concepts and Network Security Network security relates to information technology concepts as IT is all about managing, exchanging, processing and protecting information and network security is ensuring that information remains intact and available to only the authorized users. Network se...
Ping commands are useful when it comes to troubleshooting and checking to see if a website is available and how fast you would be able to access it. However, ping can also be used for malicious intent. Today I will discuss an attack possible by means of ping commands. I will also get into computer security incidents like computer viruses and phishing and discuss what makes computers vulnerable to them, the damage they can inflict and protection methods for each. Ping Commands for Malicious Intent One major attack that can be accomplished by using ping commands is a denial of service attack. A denial of service attack is when a target website is basically overloaded to the point that it is rendered useless. By using the ping command, an attacker will send oversized data packets to a target website that will be too much for it to handle and causing the site to crash, not allowing legit users to use that site for a certain amount of time. An example of this ...