Saturday, May 10, 2025

Network Security

 

In today's digital world, the security of computer systems is more critical than ever. Individuals and organizations alike rely on interconnected technologies that, while improving efficiency and communication, also expose users to various cyber threats. Two of the most damaging and prevalent forms of cyberattacks are phishing and ransomware. Both threats exploit human error and system vulnerabilities to gain unauthorized access to data, disrupt operations, and demand financial or informational ransom. This paper explores how phishing and ransomware attacks compromise system integrity, what symptoms and damage they cause, and how users can effectively defend against them.

 

Phishing and Smishing Attacks

Phishing refers to fraudulent attempts to obtain sensitive information, such as usernames, passwords, or credit card numbers, by disguising as a trustworthy source in electronic communication. Smishing is a subtype of phishing that occurs via SMS text messages. These attacks often rely on social engineering, exploiting human trust rather than technical vulnerabilities (Hadnagy & Fincher, 2018).

System Vulnerabilities

Computer systems are particularly vulnerable to phishing due to users' tendency to trust familiar-looking emails or messages. Attackers often mimic corporate branding, fake email addresses, or urgent requests (“Your account has been compromised”) to manipulate the recipient into clicking a malicious link or submitting personal data.

Symptoms and Damage

Once compromised, phishing can result in stolen login credentials, identity theft, or unauthorized access to secure systems. This can lead to financial losses, data breaches, or system downtime. For example, a successful phishing attack on a corporate email can allow attackers to access internal documents, reroute funds, or distribute malware.

Protection Recommendations

  1. User Awareness and Training: One of the most effective defenses is to educate users about the red flags of phishing, such as misspelled domains, suspicious attachments, and urgent language (Chen et al., 2021).
  2. Multi-Factor Authentication (MFA): Even if credentials are stolen, MFA can prevent unauthorized access by requiring a secondary verification step.

 

Ransomware Attacks

Ransomware is a type of malicious software that encrypts the victim’s data and demands payment, often in cryptocurrency, for the decryption key. It has become a global threat affecting hospitals, schools, municipalities, and private companies.

System Vulnerabilities

Ransomware often enters systems through phishing emails, unpatched software, or unsecured remote desktop protocols (RDP). Once inside, it can spread across networks and lock out users entirely.

Symptoms and Damage

A system affected by ransomware typically experiences sudden inaccessibility to files, pop-up ransom notes, and disabled security tools. The 2021 Colonial Pipeline attack is a high-profile example, where ransomware forced a major fuel supplier to shut down operations, leading to fuel shortages and economic disruptions.

Protection Recommendations

  1. Regular Backups: Maintaining offline backups ensures that, in the event of a ransomware attack, critical data can be restored without paying a ransom.
  2. System Updates and Patching: Regularly updating software and operating systems helps close security holes that ransomware can exploit.

 

Conclusion

As technology continues to evolve, so too do the threats that target its users. Phishing and ransomware are particularly dangerous because they often bypass technical defenses by preying on human behavior or exploiting outdated systems. To protect both individual users and organizations, a layered defense strategy is essential. One that includes user education, strong authentication, regular system maintenance, and robust data backup protocols. Awareness, preparedness, and vigilance remain the cornerstones of effective cybersecurity.

No comments:

Post a Comment

Tech Topic Connection

 Throughout this course, I’ve explored many different aspects of information technology, but one topic stood out to me the most: how compute...