Importance of Cybersecurity
Computer systems are vulnerable to various threats due to multiple factors related to hardware, software, network configurations, human behavior, and the evolving nature of cyberattacks. Two computer security incidents that could be executed using ping commands are phishing attacks and social engineering attacks. Phishing attacks trick users who aren't trained or aware of how to spot suspicious activity like spam emails, text links, or websites, which can make these attacks very effective. Some hackers have become increasingly close to mimicking trusted sources, such as banks or credit card companies, which can easily deceive users who aren't cautious.
Users can be easily tricked into providing sensitive information through social engineering techniques, including phishing attacks. In a study by R. M. Abdulla et al. in "Analysis of Social Engineering Awareness Among Students and Lecturers," only 22.8% of participants agreed they could identify spam or junk email. Because these attacks exploit human psychology rather than technology, they can be difficult to prevent using technical measures alone. A computer system user should protect oneself from phishing and social engineering attacks. It is recommended that they have essential user awareness and technical solutions. Employees who aren't trained to recognize social engineering tactics are more likely to fall for scams, giving attackers a foothold inside the organization.
Some examples include available basic spam filtering, which can look for known phishing indicators, train users to recognize warning signs of phishing attempts, such as misspellings in text or email links, and configure the system to flag suspicious emails. Social media platforms create opportunities for cybercriminals to execute more tailored and complex phishing attacks, often more complicated for users to detect than those carried out via other channels, such as email. This can reduce users' awareness and resistance to phishing attempts on social media, making them more vulnerable to such attacks. As a result, susceptibility to social media phishing can be seen as a conflict between the temptation to engage with phishing messages and the user's ability to resist them. (Qahri-Saremi, H., & Turel, O., 2023)
Comments
Post a Comment