Monday, April 8, 2019
Security Risks for Computers at Home Essay Example for Free
warrantor Risks for Computers at Home EssayIndividuals plebeianly associate calculating machine warrantor risks exclusively with thoughts regarding computers in businesses and corporations. However, crimson for an average intentr, computer credential risks argon indeed present especially if a liaison to the net income is present (Wang, 2003). To some, having risks in relation to the use of in the flesh(predicate) computers at crustal plate whitethorn not repair to anything of serious servant.In reality though, if one considers the multitude of tasks usually done using the home computer, which oftentimes contain important personal data, then pledge threats for a home computer whitethorn be more serious than it is commonly thought of (United States Computer Emergency Readiness Team USCERT, 2001). Therefore, it is important to esteem the authorisation security threats and methods of fall upon that be related to home computer security. As mentioned, security thre ats for the home computer are a reality.In this reek, there are indeed numerous examples of potential security threats especially if one has a connection to the internet and constantly uses the different functions of the web. Some of the most common forms of security threats to home computers are in the form of fifth column one dollar bill programs and back door programs. Trojan horse programs are hawkshaws in which malicious files are allowed entry to the system upon the placement of the Trojan horse which usually wears the form of something that whitethorn not seem harmful based on the evaluation of a common user (USCERT, 2001).Given such(prenominal) functions and features, it is very much apparent as to why Trojan horse programs are called as such. As antecedently pointed out, back door programs are also examples of programs that vex a threat to home computers. Characteristically, back door programs, which are also referred to as remote governance programs, provide other individuals the means to control the home computer through a network connection (USCERT, 2001). Other home computer security risks come in vastly different forms.For one, an attack termed as denial of service, allow other individuals to incapacitate a home computer by placing extreme amounts of mark upon it in terms of data processing in addition, it is commonly taken into consideration that individuals that aim to attack other home computers usually take advantage of home computers that they have already compromised (USCERT, 2001). As previously pointed out, home computer users are probably not as skilled in terms of providing auspices for their computers and their networks as compared to those that use computers in large businesses and firms.In this sense, unprotected networking shares whitethorn be considered as potential entry points used for placing and triggering different security threats also packet sniffing may be used to take advantage of how private instruction are sen t through a common network (USCERT, 2001). In addition, mobile codes such as Java, Javascript, and even ActiveX as well as cross site scripting, may be used to compromise home computers and the users.Specifically, personal information may easily be attain through such codes and scripts if one is not careful (USCERT, 2001). Individuals that aim to cause harm towards home computer users take into account some of the most common tasks accomplished through the use of the internet. As mentioned, codes and scripts may be used to the detriment of a user during the course of web browsing. Email spoofing and electronic mail borne viruses are two of the most common concerns regarding email and its relation to home computer security.While email spoofing may be a form of trickery so that the user may assume that the sender of the information is rather trustworthy and will hence not be cautious in his or her reply, email borne viruses use trickery as well but also uses malicious codes in the form of modishly disguised as attachments to various types of messages which is made worse by the fact that hidden file extensions may be taken advantage of to make a virus appear to be harmless (USCERT, 2001). In addition, chat clients are also considered to be of potential risk.The main reason for such as consideration is that chat clients are highly similar to email in terms of function (USCERT, 2001). Given a varied assortment of types of security threats to home computers, one may already develop a sense of understanding as to how attackers gain information from a computer system. One method or proficiency used by attackers is through disguising a security threat as something that seems harmless, as it is quite expectable that even the average user has a sense of what is harmful if it is blatantly evident (Wang, 2003).From the previous discussion, such an approach may be observed from the distribution of Trojan horses, malicious code and scripts on websites, and email and cha t client viruses. Expectedly, if the disguised program or code is transferred into the home computer and it is run, then personal information may then be transferred to the attacker. Aside from such an indirect approach, attackers may also use direct approaches in taking personal and important information.As exemplified by packet sniffing and network and computer access through previous placement of a malicious program or through acknowledgement and manipulation of weaknesses in security, attackers may use immense technical knowledge to directly select and obtain the information that they need such as credit card numbers (Wang, 2003). In general, it is made evident from the points discussed that home computers are also at risk due to the presence of different potential security risks as well as various ways in which attackers may use such security risks.Home computers that are connected to the internet may be seen both as a address of convenience for users but may also be perceiv ed as a possible tool in which important information utilized by the user may be threatened. There are ways in which the negative aspects of home computing and security risks may be minimized by developing a better understanding of such security threats and methods of attack. Therefore, even for home computer users, broaden the level of knowledge regarding such issues of concern is certainly not a waste of time.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.