Skip to main content

Ping Commands, Viruses, and Phishing

 

    Ping commands are useful when it comes to troubleshooting and checking to see if a website is available and how fast you would be able to access it. However, ping can also be used for malicious intent. Today I will discuss an attack possible by means of ping commands. I will also get into computer security incidents like computer viruses and phishing and discuss what makes computers vulnerable to them, the damage they can inflict and protection methods for each.

Ping Commands for Malicious Intent

One major attack that can be accomplished by using ping commands is a denial of service attack. A denial of service attack is when a target website is basically overloaded to the point that it is rendered useless. By using the ping command, an attacker will send oversized data packets to a target website that will be too much for it to handle and causing the site to crash, not allowing legit users to use that site for a certain amount of time. An example of this came very recently in October of 2024 when Cloudflare, an internet security company mitigated a denial of service attack that lasted for 65 seconds effecting financial services and telecommunications (Lakshmanan, 2024). This can be prevented by ensuring you are using modern equipment and keeping the software on that equipment up to date.


Computer Viruses

There are multiple types of computer viruses that can infect your computer such as the macro virus, ransomware, trojan horse and worm malware to name a few. Computers are vulnerable to viruses for a few reasons such as not having updated software, leaving your computer vulnerable to viruses that can take advantage of its weak spots. Another is human error, by visiting an untrusted website that downloads a virus onto your device without you even knowing. Some symptoms your computer will have when infected is that it will be running slower than usual, having frequent system crashes and a noticeable uptick in pop up windows just to name a few. Now according to National Cybersecurity Alliance, some ways to prevent a computer from getting a virus is by using antivirus software such as Norton or McAfee that aid in the protection against viruses and other threats and being mindful of public wi-fi as they are often unsecure leaving your devices vulnerable to such viruses (National Cybersecurity Alliance, 2023). When using public wi-fi it is suggested to use a VPN for a more secure way to connect.


Phishing

Phishing is an attempt to get individuals to provide personal data by posing as legitimate entities such as your bank, amazon, the post office or your email provider. Computer systems are vulnerable to this because of a lack of awareness among users and simply how easy it is for someone to send mass phishing emails as it takes little effort to attempt. Some signs that your computer may be infected is unauthorized logins to accounts, an increase in unfamiliar emails and like viruses, your computer operating slower than normal. The damages this can cause is your personnel information being stolen such as your social security number and login information. Another damage is you may take a loss financially if they get access to bank account passwords. Ways to prevent this is to get educated on how to recognize the common and newest phishing scams and hover over links before clicking on them to see the URL and ensure the website uses HTTPS before entering any personnel information. By getting smart on common computer security incidents, how to recognize them and prevention methods, you are giving yourself a better chance at not falling victim to these security incidents.



References:

Lakshmanan, R. (2024, Oct 4) The Hacker News. Cloudflare Thwarts Largest-Ever 3.8 Tbps DDoS Attack Targeting Global Sectors. https://thehackernews.com/2024/10/cloudflare-thwarts-largest-ever-38-tbps.html?form=MG0AV3

National Cybersecurity Alliance. (2023, Feb 13). How to Tell If Your Computer Has a Virus and What to Do About It. https://www.staysafeonline.org/articles/how-to-tell-if-your-computer-has-a-virus-and-what-to-do-about-it





Comments

Popular posts from this blog

The Pros and Cons of Microsoft Word, Excel, and PowerPoint

    All throughout the information technology world you will at some point have to utilize applications such as Microsoft Word, Excel and PowerPoint. These are some of the most common and basic applications that are out there today. Today I will be discussing the advantages and disadvantages of each, and how they compare to one another. Microsoft Word Advantages: Versatility in Writing: Word is perfect for all writing purposes, whether you're drafting a book, essay, poetry, contract or work memorandum. Formatting: It offers a lot of formatting tools, including various font styles, sizes, alignments, customizable margins, and borders for a more appealing document. User Friendly: This application is really easy for the user to utilize, navigate and learn quickly. Disadvantages: Limited Data Formatting: Word excels in writing and formatting that text, however, it lacks the data formatting capabilities found in other applic...

Intro to Programming Languages

  Having very little IT experience, this project is my first steps towards a better background in that department. It is exciting and makes me nervous at the same time as I have never used nor even read about programming languages before. This was the same for the program Scratch, but the outcome was positive and gave me a better understanding of what program coding consists of. The following is the link to my Scratch program :  https://scratch.mit.edu/projects/1116622511 This was quite interesting, having never used the program Scratch, I found myself struggling a bit at first trying to figure out how all the different codes would affect the outcome. Once I had a decent grasp of that, I knew what I wanted to do but getting the figures to do it how I wanted was the challenge. The biggest challenge was getting the timing right for everything. I overcame this by simple trial and error. I would set a time for something, run the program and see if it needed to be slowed or sped up...