Getting to Know Network Security



With the information we currently store on our computers, such as card numbers, addresses, and other pieces of information, computers are always open to hackers looking for ways to get that information. Two ways that I will discuss are through viruses and password theft. While both are typically attempted to obtain your personal data, both work in very different ways to accomplish that goal.
With viruses, a downloaded program, usually from an email attachment, scans the user’s system for information (Vahid, 2017). These often spread via the way mentioned in the text, but it can also spread via both mechanical and social networks. For instance, with using a mechanical network, a virus may obtain a computer’s IP address, then it will systematically seek out similar IP addresses. If a virus using a person’s social networks, it will look for an address book of emails that it can send to (Guo, 2016).


In the case of a mechanically spreading virus, having dynamic random IP addresses could help curb the spread. It would be a way to keep the virus from being able to work systematically. This method, among others in the next paragraph are examples of  “impulsive detoxication” (Zhang, 2016) which is how networks and OSes actively stay ahead of dangerous software attacks by using automated preventative measures. In the case of a social network method of spreading, users must be aware of the danger of download attachments from strangers and even unexpected downloads from friends.
Another way is to keep one’s computer up to date with system updates. This ensures that weaknesses in the system are patched up quickly. Another way is to run in a safe download mode unless a user really needs a certain download. Both Windows and MacOS offer a mode whereby the user can only download applications that have been approved via their online marketplace. All of the major applications are here without the fear of accidentally download a false version. Plus, in the event that the user needs an application that it trusts, yet it is not on the marketplace or app store, the user can manually allow this download one time.


The most popular way to add protection in addition to smart practices is to download antivirus software that can detect, quarantine, and remove malicious software (malware) from the system. Norton, MacAfee, and Kaspersky are large, reputable antivirus producers. Sophos and Microsoft Defender are other options that are free.


One other measure one can take to protect themselves from losing personal data to criminals is to mindfully make passwords. According to Wang, most people, especially men, tend to use birthdates and their own names in their passwords. Wang also points out the weakness inherent in human-made passwords is that people use words. A dictionary protocol can, given enough time, decipher any passwords that use words (2017). This means that it is best to use passwords that are truly as random as possible. “R4$jn!2d” is far more effective than “Zahid75!” or “27football.” To help, there are systems that can make randomized passwords for the user such as Apple’s Vault or the app, “1password.” Finally, no matter how complex the password is, unique passwords are better. That means that one should never use the same password for Gmail that they use for their bank or credit card login. Separate passwords guarantee that even is a password was to be hacked, the malicious software would not have access to all of the user’s data.








References

Guo, H., Cheng, H. K., & Kelley, K. (2016). Impact of Network Structure on Malware Propagation: A Growth Curve Perspective. Journal Of Management Information Systems, 33(1), 296-325. doi:10.1080/07421222.2016.1172440

Vahid, F., & Lysecky, S. (2017). Computing technology for all. Retrieved from zybooks.zyante.com/

Wang, H., Li, Y., & Sun, K. (2017),  Personal Information in Passwords and Its Security Implications. IEEE Transactions on Information Forensics and Security. 12(10), 2320-2333. DOI: 10.1109/TIFS.2017.2705627

Zhang, X., Li, C., & Huang, T. (2016). Impact of impulsive detoxication on the spread of computer virus. Advances In Difference Equations, 2016(1), 1-18. doi:10.1186/s13662-016-0944-x

Comments