Chapter 6 - Network Security

 Why Network Security Matters: Protecting Systems in a Digital World


            When we think about the safe use of a computer or the Internet, it may seem easy to assume that our interest should be focused on strengthening the system to avoid any virus or malware, but in the world of cybersecurity, the weakest link is often not the system, but the human using it. Social engineering is based on deception to gain the user's trust and thus obtain the access or information necessary to commit acts known as phishing. This paper explains how computer systems are vulnerable to social engineering and phishing, the types of damage these attacks can cause, and strategies individuals and organizations can use to protect themselves.

Social Engineering

According to CertMaster Learn Tech+ by TestOut Corp (2024), social engineering is defined as “an activity where the goal is to use deception and trickery to convince unsuspecting users to provide sensitive data or to violate security guidelines.” This means that even with top-tier antivirus software or firewalls in place, we’re still vulnerable. As Kolinko et al. (2024) explain, “the rapid development of virtual reality, digital space, and neural networks … reliable antivirus programs and the powerful work of firewalls could not provide a reliable protection and filter all potentially threatening and harmful content” (p. 16). This highlights that social engineering relies on manipulation, not necessarily hacking tools, which makes the threat harder to predict or detect. These attackers often target users who lack awareness or proper training, tricking them into giving up information or access.

 

The damage caused by social engineering can vary widely. Attackers might gain unauthorized access to online accounts, or even physical locations, by using stolen personal information like addresses or phone numbers. They might leak, sell, or misuse this data, leading to identity theft, financial loss, system compromise, or even personal safety risks.

 

So, how can we protect ourselves? The answer starts with knowledge. In the workplace, regular training should be provided to help employees recognize and report suspicious activity. Outside of work, many platforms now offer educational tools. Social media sites share warnings or videos, and YouTube has tutorials dedicated to raising awareness. On a personal level, setting up strict access controls, such as two-factor authentication or identity verification methods, is one of the best ways to prevent unauthorized access.      

Phishing

One of the most well-known cyber engineering attacks is phishing. Phishing is carried out by cybercriminals who attempt to mislead users into confusing situations in order to acquire sensitive data like usernames, passwords, credit card numbers, or other personal data, at the most vulnerable point. The method of communication for these attacks varies. They can be used through emails, fake websites, or text messages posing as legitimate companies, and they can even go so far as to impersonate real people or employees to make it difficult to verify their identities. The main goal of these individuals is to create false emergency situations to pressure their victims into acting without thinking and obeying their instructions.

As with cyber engineering, detecting phishing vulnerabilities in a system starts with identifying weak points in human behavior and system controls. Many users may not recognize fake login pages or suspicious email attachments. A lack of awareness or poor cybersecurity training can leave individuals and organizations exposed. The consequences or damages of phishing, as I mentioned previously, are unauthorized access to accounts, financial losses and personal security risks.

According to a 2024 article by TechRadar Pro, phishing and identity fraud have grown into a billion-dollar criminal industry. U.S. consumers alone lost $12.5 billion to identity-related fraud in one year. The article explains how phishing attacks have evolved, with criminals now using AI, deep fake technology, and “Fraud-as-a-Service” platforms to carry out large-scale operations.

 

Conclusion

After learning more about social engineering and phishing, it’s clear that the biggest weakness in cybersecurity isn’t always the system, often times it is the person using it. These types of attacks don’t need complicated code or hacking tools; they rely on tricking people through trust and urgency. The damage they can cause is serious, from stolen personal information and financial loss to bigger system breaches. The article from TechRadar Pro really opened my eyes to how large-scale and advanced these attacks have become, especially with criminals using AI and fake identities to make their scams even more believable. The most important thing we can do to protect ourselves is to stay informed and cautious. Whether it’s through workplace training or just being more aware online, a little knowledge can go a long way. Technology helps, but at the end of the day, it's up to us to recognize the signs and take steps to stay safe.

 

Sources

TestOut Corp. (2024). CertMaster Learn Tech+. http://www.testout.com

 

Kolinko, M., Petryshyn, H., & Chumak, H. (2024). Reactualising the problem of social engineering and digital security. Skhid6(1), 9–17. https://doi.org/10.21847/2411-3093.2024.611

 

TechRadar Pro. (2025, July 8). Inside the billion‑dollar identity fraud ecosystem. TechRadar Pro. Retrieved July 11, 2025, from https://www.techradar.com/pro/inside-the-billion-dollar-identity-fraud-ecosystem


Post a Comment

0 Comments