Post 6 Network Security

          



        One of the attacks that can happen with ping command is a DoS (Denial of Service) attack is submitting huge numbers of access request simultaneously to one target website, causing that site’s web server to be overloaded, this preventing legitimate request from being handled and those requests are a denied service. (Frank Vahid /  Professor of Computer Science and Engineering / Univ. of California, August 2017) For example the PlayStation and Xbox networks had these attacks a few months ago causing millions of gamers not able to play online or use the PlayStation services that millions pay for.  Computers can experience this and that is known as DDoS (distributed DoS) which uses infected computers.  There are different types of DoS like “Ping of Death” that uses availability of network resource, works by sending small data packets to the network resource. (99, n.d.) A blind ping flood involves an outer program to reveal IP address of target computer or router before an attack like a timed delay or a timer. (Flood, n.d.)
Security is a big part of the IT world and there are many kinds of vulnerabilities and security holes and a way of finding them or getting someone to give you access to them is through Email Spam or Phishing Scam.

Comments

Popular Posts