Security Threats at Home
Online Security in the homes is an issue and not for organization alone. Mainly at risk are confidentiality, integrity, and availability of our network. Some risk arises from misuse unintentionally or by an intruder via the Internet. There are potential threats on a home personal computer and it is important to know the techniques employed by the attackers in order to secure our systems information. It is important to learn the basics in protecting our loved ones online but first let us know what hackers use to intrude and damage our systems.
Anyone who sits in the computer almost everyday and surf the internet at least once a week is highly at risk against online security threats and must employ privacy protection. For these reasons, it is best to employ computer security so that our systems would not be used by intruders and unauthorized users. A worst scenario is having your computer controlled by an intruder to launch a terrorist attack. Those with broadband connections are twenty four hours connected to the internet. These are people literally called sitting on the internet and are potentially at the high risk.
They are the ones who are exposed to hackers that could maliciously access their
It can easily capture data transmitted from users to any cable modem in the neighborhood. Some intentional misuse of personal computers used by intruders is the use of the Trojan horse program referred also as social engineering (University, 2001). It re configure the system and infect your computer with viruses it can be installed thru back door programs. The DoS attack is the denial of service; this can make other computer get affected thru the use of your computer, it could crash a system and makes a network too busy processing a data that it makes it impossible to use.
We should also be wary in exchanging files with unknown parties and limit the chat client’s in downloading files. Spyware and McAfee monitors viruses and worms that infects the PC systems in a lot different ways like it infects 90% of any Internet connected PC’s thru visiting and opening a spy carrying email attachment (Online-Security-Solutions. om, 2004).
New forms of threats can come in variants way everyday that an attacker may gain access to some information. Consulting support system personnel, using a firewall, putting off the computer when not in use, changing SSID (service set identifier default) regularly, patching, updating software protection, knowing email borne viruses and preventing the opening of these files, and using encryptions can protect the home network security system but unfortunately holes are always discovered by hackers to exploit and the complexity of software makes it difficult to sustain security.