Network Security
The internet has allowed for so many positive advancements in technology. Unfortunately, the worldwide connection also brought about advancements in malicious attacks that make networks vulnerable to a host of security breaches. Each kind of breach opens up a computer to a different threat. These breaches can be caused by everyday occurrences – websites, emails, even pinging. Awareness of security holes and vulnerabilities and attacks like phishing help organizations and individuals alike to keep their networks secure. The ping technique is an excellent example of how a purposeful network tool can also be used maliciously. Pinging is done to test a network connection by sending a packet of information to a recipient and requesting a response. In a Ping Flood, packets are sent as quickly as possible and the response packets are discarded, overwhelming the recipient’s network, and resulting in a Denial of Service (Do...