.

Thursday, June 6, 2019

Security Risks for Computers at Home Essay Example for Free

Security Risks for Computers at Home EssayIndividuals commonly associate computing device guarantor risks exclusively with thoughts regarding ready reckoners in businesses and corporations. However, thus far for an average user, computer security risks atomic number 18 indeed present especially if a connection to the internet is present (Wang, 2003). To some, having risks in relation to the use of personal computers at piazza may not pertain to anything of atrocious consideration.In reality though, if ane considers the multitude of tasks usually done with(p) using the home computer, which often contain important personal data, then security scourges for a home computer may be more serious than it is commonly thought of (United States Computer Emergency Readiness Team USCERT, 2001). Therefore, it is important to assess the potential security threats and methods of attack that ar related to home computer security. As mentioned, security threats for the home computer are a reality.In this sense, there are indeed numerous examples of potential security threats especially if one has a connection to the internet and constantly uses the different functions of the web. Some of the around common dos of security threats to home computers are in the form of Trojan horse cavalry architectural plans and back door programs. Trojan horse programs are tools in which malicious files are get outed entry to the system upon the placement of the Trojan horse which usually takes the form of something that may not seem harmful based on the evaluation of a common user (USCERT, 2001).Given such(prenominal) functions and features, it is very much unvarnished as to why Trojan horse programs are called as such. As previously pointed out, back door programs are also examples of programs that pose a threat to home computers. Characteristically, back door programs, which are also referred to as remote administration programs, provide other individuals the means to c ontrol the home computer through a network connection (USCERT, 2001). Other home computer security risks come in vastly different forms.For one, an attack termed as denial of service, allow other individuals to incapacitate a home computer by placing extreme amounts of stress upon it in basis of data processing in addition, it is commonly taken into consideration that individuals that aim to attack other home computers usually take advantage of home computers that they have already compromised (USCERT, 2001). As previously pointed out, home computer users are probably not as skilled in terms of providing protection for their computers and their networks as compared to those that use computers in large businesses and firms.In this sense, unprotected networking shares may be considered as potential entry points used for placing and triggering different security threats also packet sniffing may be used to take advantage of how toffee-nosed information are sent through a common netw ork (USCERT, 2001). In addition, mobile codes such as Java, Javascript, and even ActiveX as well as cross site scripting, may be used to compromise home computers and the users.Specifically, personal information may easily be attained through such codes and scripts if one is not careful (USCERT, 2001). Individuals that aim to cause harm towards home computer users take into account some of the most common tasks accomplished through the use of the internet. As mentioned, codes and scripts may be used to the detriment of a user during the course of web browsing. Email spoofing and email borne viruses are two of the most common concerns regarding email and its relation to home computer security.While email spoofing may be a form of jiggery-pokery so that the user may assume that the sender of the information is rather trustworthy and will hence not be cautious in his or her reply, email borne viruses use trickery as well but also uses malicious codes in the form of cleverly disguised as attachments to various types of messages which is made worse by the incident that hidden file extensions may be taken advantage of to make a virus appear to be harmless (USCERT, 2001). In addition, chat clients are also considered to be of potential risk.The main reason for such as consideration is that chat clients are highly similar to email in terms of function (USCERT, 2001). Given a varied assortment of types of security threats to home computers, one may already develop a sense of understanding as to how attackers gain information from a computer system. One method or technique used by attackers is through disguising a security threat as something that seems harmless, as it is quite expectable that even the average user has a sense of what is harmful if it is blatantly evident (Wang, 2003).From the previous discussion, such an approach may be observed from the distribution of Trojan horses, malicious code and scripts on websites, and email and chat client viruses. Expected ly, if the disguised program or code is transferred into the home computer and it is run, then personal information may then be transferred to the attacker. Aside from such an indirect approach, attackers may also use direct approaches in taking personal and important information.As exemplified by packet sniffing and network and computer access through previous placement of a malicious program or through identification and manipulation of weaknesses in security, attackers may use immense technical knowledge to directly select and acquire the information that they indispensability such as credit card numbers (Wang, 2003). In general, it is made evident from the points discussed that home computers are also at risk due to the mien of different potential security risks as well as various ways in which attackers may use such security risks.Home computers that are connected to the internet may be seen both as a source of convenience for users but may also be perceived as a possible too l in which important information utilized by the user may be threatened. There are ways in which the negative aspects of home computing and security risks may be minimized by developing a better understanding of such security threats and methods of attack. Therefore, even for home computer users, broadening the level of knowledge regarding such issues of concern is certainly not a waste of time.

No comments:

Post a Comment