Hello, my name is Rob and I am excited to start my academic and professional journey in the information technology world. My current background in this area is very slim and limited to just the basics as of right now. It wasn’t until recently that I decided to dive head first into this field of study. Even though I am just starting out, I am excited to learn and build a solid foundation in the field of information technology. Currently, I am taking online courses towards a degree in Cyber and Data Security as this is the particular area of information technology that I ultimately want to pursue as a career as it is a big part of today’s world. I am eager to understand the intricacies of data protection, network security, and threat mitigation from potential threats. I am aware this is a constant changing career field as cybersecurity faces new challenges often and the need to find new innovative solutions to solve problems is another concept that appeals to me as I like to try and solve problems and be a part of that solution. As I progress on this journey, I am confident that my dedication and passion for cybersecurity will enable me to contribute to the career field and make a positive impact.
Ping commands are useful when it comes to troubleshooting and checking to see if a website is available and how fast you would be able to access it. However, ping can also be used for malicious intent. Today I will discuss an attack possible by means of ping commands. I will also get into computer security incidents like computer viruses and phishing and discuss what makes computers vulnerable to them, the damage they can inflict and protection methods for each. Ping Commands for Malicious Intent One major attack that can be accomplished by using ping commands is a denial of service attack. A denial of service attack is when a target website is basically overloaded to the point that it is rendered useless. By using the ping command, an attacker will send oversized data packets to a target website that will be too much for it to handle and causing the site to crash, not allowing legit users to use that site for a certain amount of time. An example of this ...