Network Security

When people interact with websites online, the interaction requires sending information and receiving what is requested. Information technology professionals best describe sending and receiving information (packets) as pings. Pings are meant to diagnose if a computer is experiencing a virus or if the internet service provider (ISP) is experiencing traffic in the network or malfunctioning equipment. However, there are instances where computers are hacked and used without owner knowledge, running in the background using private credentials or from cloud-based servers. Because computers run functioning processes without human interaction, these processes can be changed to act on behalf of the computer’s owner, permitting the ill effect of network security.

Types of Computer Security Attacks

People access the internet using personal ISP networks that connect to the World Wide Web on their computers. Some of the ways computer viruses get around ISP firewalls are through personal emails and phishing spam. The spammers can also get around U.S. federal laws like CAN-SPAM and anti-hacking by users clicking links and downloading that target private information. The spammers know they are not breaking the CAN-SPAM law created by the Federal Trade Commission (FTC). Clicking on links permits hackers, as long as the phishing worked, to use private information provided on a fake website access and renders anti-hacking laws null. 

Don't worry my links are safe to click. Just hover over them and look for the https://

Symptoms of A Compromised System

The symptoms computers present are not easily seen when phishing viruses infect them after interacting with the web. Once infected, computers present with illnesses similar to human diseases where “the life cycle of computer viruses needs to go through four different stages, namely: incubation, infection, trigger, and diffusion,” like missing and corrupted data and memory and changes to main computer administration functions (Niu & Fan, 2024, p. 2). The computer may become slower when switching from program to program, the battery may become hotter, and need resetting frequently to clear built-up bugs. 

Viruses are said to replicate within a host and move to other hosts , evolving with each computer transition with many types of physical interactions. The illness spreads quickly through email transmissions using digital veins pumping throughout the internet. Email sepsis ensues privately as viruses turn the computer's DNA into a super monster with a smoking gun and badge. 

Hackers authoritatively rule the changed computer system requirements:

  1. The “functions a system should perform like expected inputs, outputs, internal processing, and user interactions,” 
  2. The “non-functions like system’s performance and quality standards, such as usability and security” through email spam links (Vagle, 2023, p. 352)
These computer functions and non-functions run in the background in hidden file folders on the hard drive where important data lay securely vulnerable. In these vulnerable places, the viruses slowly replicate and copy saved passwords, IRS tax documents, and anything else that can be devoured. The computer virus has now stolen two identities and is looking for more identities to steal, capturing each keystroke like an artificial intelligence algorithm.

Conclusion

In summary, exposing yourself without the right weapon will cause you to become an artificial, living, dead zombie hungry for more brain power. 

Recommendations

  • Boost your supplemental maintenance by creating restore points in the computer system and placing important documents on external hard drives that should not be deleted for immunity. 
  • Strap up with many types of arsenal to battle the viruses, like purchasing computer memberships from IT professionals that can keep your computer healthy and updated. 
A private phishing email from a friend or family member can be deceptive, and hackers creating spam know which heartstrings to pluck to get a click. Those clicks can create the spark to blow up your life and end the world as you know it to be.

Do you have more recommendations OR questions?

Post your SAFE comments below!

Comments

Popular Posts