Network Security

Importance of Information and System Security

            Information and System Security are essential for both individuals and organizations because every day we rely heavily on digital systems. Personal Information, financial information, and sensitive organizational data are often stored and transmitted through computer networks. As stated by Fortinet (n.d.), “Information security helps safeguard an organization’s data, systems, and operations from ever-evolving cyber threats”. Additionally, TestOut (2024) explains that “Almost every computer stores data of some kind. The computer is valuable for what it holds”. These statements highlight how closely information and system security are connected. Without proper security measures, information can be stolen, altered, or destroyed by hackers. Security breaches can lead to identity theft, financial loss, and disruption of business operations. Due to these risks, individuals and organizations must take time to implement the best security practices and educate themselves on how to identify and avoid potential threats. 

Attack That Can Be Executed Using Ping Command

            One type of attack that hackers can perform using the ping command is called a ping sweep. A ping sweep occurs when an attacker sends ping requests to multiple IP addresses within a network to determine which devices are active. By identifying which systems respond, attackers can create a list of live hosts on the network. As explained by VPN Unlimited (2026), “Attackers compile a list of IP addresses that responded to the ICMP echo requests, providing them with valuable information about the live hosts in a network. This aids attackers in further exploitation such as launching targeted attacks or identifying potential vulnerabilities in specific hosts.” This information allows attackers to map the network and potentially plan more targeted cyberattacks against vulnerable systems.

Malware and Ransomware

Malware is a “Software that serves a malicious purpose, typically installed without the user’s consent (or knowledge)” (Testout, 2024) whereas ransomware “is a type of malware that holds a victim’s data or device hostage, threatening to keep it locked-or worse-unless the victim pays a ransom to the attacker” (Kosinski, 2024).

Computer systems are vulnerable to malware and ransomware because users may accidentally download infected files on a computer, click on malicious links, or install software from untrusted sources. Outdated operating systems and weak security settings can also increase vulnerability. According to Midwest Data Center (2025), “Running outdated software or unsupported operating systems is one of the most common causes of modern cyberattacks”.  Additionally, lacking antivirus software can add to this because it “helps identify and stop harmful attacks on your computer or network” (TestOut, 2024) making it an essential software to have to help prevent these two threats from happening. Hackers often will use email attachments, infected websites, or other vulnerabilities to distribute malware.

Once a system is infected, several symptoms may appear. The computer may run slower than usual, display unexpected pop-ups, or programs may crash frequently (UT Southwestern Medical Center, 2024). In the case of ransomware, users may lose access to their files because they have been encrypted. This can cause major disruptions for organizations, including loss of important data, financial damage, and downtime to try and fix the issue.

There are several ways to protect systems from malware and ransomware. One recommendation is to install antivirus software to detect and remove threats before they cause damage. Another important measure is to keep operating systems and applications updated with security patches. Lastly, users should avoid downloading files or clicking links from unknown or suspicious sources as you should always verify who the sender is.

Phishing and Smishing

Phishing attacks will usually be pushed out through email as Smishing attacks will usually go through text messaging. As stated in TestOut (2024), “Phishing and smishing attacks happen when someone tries to trick users into giving away their private information through a communication that looks like it's from a real place, like a bank or an online store”.

Computer systems are vulnerable to phishing and smishing attacks because these threats rely on human behavior rather than technical weaknesses. Attackers will often disguise their messages to appear as though they come from trusted sources. Because these messages appear legitimate, users may unknowingly click on harmful links to provide personal information such as “usernames, passwords, social security numbers, and bank details” (University of Cincinnati, 2026).

After a successful attack, several problems may occur. Hackers may gain access to personal accounts, financial information, or organizational networks. Victims may experience unauthorized purchases or stolen identities. For businesses, phishing attacks can lead to “loss of revenue, damage to reputation, loss of clients, lawsuits, and compromised business information” (Cannon, 2024). 

As for recommendations to prevent these attacks, first, users should always carefully examine emails and text messages for suspicious signs such as spelling errors, unusual links, and these so-called urgent requests for personal information. Another way would be to implement cybersecurity awareness training to help employees recognize common phishing and smishing tactics. The reason I say this is because being in the Air Force this is one of our annual training requirements and it does help us to remember what to look out for! Lastly, use spam filters and email security tools to help block phishing attempts.

 References

Cannon, B. (2024, July 24). The Reality of Phishing, Smishing, and Vishing Attacks. ESI Technology Advisors . https://www.esi.tech/the-reality-of-phishing-smishing-and-vishing-attacks-on-businesses/

Fortinet. (n.d.). What Is Information Security? | Fortinet. Fortinet. https://www.fortinet.com/uk/resources/cyberglossary/information-security

Kosinski, M. (2024, June 4). Ransomware. IBM. https://www.ibm.com/think/topics/ransomware

Midwest Data Center. (2025, October 8). Why Do Outdated Systems Increase Cybersecurity Risks, and What Can Businesses Do About It? - Midwest Data Center. Midwest Data Center. https://mwdata.net/why-do-outdated-systems-increase-cybersecurity-risks-and-what-can-businesses-do-about-it-rockport-mo/

TestOut Corp. (2024). CertMaster Learn Tech+. http://www.testout.com

UT Southwestern Medical Center. (2024). Recognize Malware & Ransomware. Utsouthwestern.edu. https://www.utsouthwestern.edu/employees/information-security/awareness/malware-ransomware/

University of Cincinnati . (2026). Phishing. Digital Technology Solutions. https://www.uc.edu/about/ucit/about/cybersecurity/phishing.html

VPN Unlimited. (2026, March 10). What is Ping sweep - Cybersecurity Terms and Definitions. Vpnunlimited.com. https://www.vpnunlimited.com/help/cybersecurity/ping-sweep?srsltid=AfmBOoosSAsugZ-LCBvua20EuWocf2pzMqxLPgHA-BeOgaWn86DvnPBw 


Comments

Popular Posts