Posts

Showing posts from October, 2022
  Web Request       Goddie Robins   Introduction I shall boot up my laptop and connect to an Ethernet connection through the Ethernet switches to the school router. The school router connects to an internet service provider (ISP) which provides DNS services to the school. Therefore, the DNS servers are located on the ISP’s network. The DHCP server is running on the school’s router. When I plug in the Ethernet cable, I cannot access any webpage since I lack an IP address. Therefore, the school’s network will first run its DHCP server to generate an IP address for my device.   Web Request My laptop’s operating system will generate a DHCP request and add the request to the UDP segment that contains the DHCP server and client. The UDP message is encapsulated in an IP datagram containing the source IP address (0.0.0.0) since his device has not been allocated an IP address. Still, I cannot access the network. The IP datagram that contains the DH...
    Ethics in Phishing     by     Goddie Robins   Ethical Theories & Codes Phishing initially involved posing as administrators and emailing internet users requiring them to enter login credentials. Internet users were sent instant messages asking them to confirm billing information or verify their accounts. These messages required them to enter their login credentials which were later used for malicious purposes. Phishing victims were sent messages where they were asked to click on links to verify illegitimate purchases. People were more susceptible to personalized emails since they involved senders they were already familiar with. With personalized emails, attackers could target large corporations and gain large sums of money. People were becoming familiar with general emails and were more aware of such attacks. Links make it easier and faster to access information from external webpages. Links direct users to e...
Image
  Phishing Phishing is a form of social engineering attack that aims at encouraging internet users to reveal sensitive information such as bank login credentials and credit card numbers through websites that appear legitimate. Attackers, in this case, pretend to be companies or acquaintances that send messages containing links to phishing websites. Ollmann (2004) conducted a survey that revealed 57 million internet users received phishing emails in the United States and 2 million victims were compromised. Another survey revealed that there were 1,862 data breaches in 2021, with each breach costing businesses an average of $4.65 million (Fowler, 2022). This study discusses the types of phishing attacks, their implications, challenges and ways of identifying and preventing them. Phishing attacks in the airline, education and healthcare sectors in the United States led to losses of about US$100 million (Sadiq et al., 2021). Attackers used email phishing to steal workers’ login ...