Cyber Attack Prevention for the Home User: How to Prevent a Cyber Attack

By Tony M. Damico
2009, Vol. 1 No. 11 | pg. 1/1

As the sophistication of cyber criminals continues to increase, their methods and targets have also evolved. Instead of building the large Internet worms that have become so familiar, these criminals are now spending more time concentrating on wealth gathering crimes, including fraud and data theft. An online article from CyberMedia India Online Ltd., suggests that because home users often have the poorest security measures in place, they have become the most widely targeted group.

CyberMedia states that 86% of all attacks are aimed at home users (2006). As attacks on home users increase, new techniques are surfacing, including the use of malicious code to attack web browsers and desktop applications.

The following is a short review of some techniques that are easily employed and can help stem the tide of these criminal cyber attacks:

Although home users may not feel like they are connected to a network, any activity on the Internet can be considered "networked activity." Therefore, protection measures employed by networks may also benefit the home user. Routers and firewalls can help control access to a home computer, but more specific steps may be utilized.

Consider the difference between network intrusion prevention and network detection systems. Prevention systems “automatically detect and block malicious network and application traffic, while allowing legitimate traffic to continue through to its destination” (Top Layer, 2008). A detection system may detect suspicious activity, but where is the protection from fast acting attacks? A prevention system must identify and stop malicious attacks before they do damage and have a chance to infect a system. As the Top Layer article indicates, “[The prevention system] must operate with switch-like latency at all times” (2008). Technology from the nineties will no longer suffice to protect users from attack by today’s modern cyber-criminal.

The prevention system must not only block malicious code, but it must also never block legitimate traffic even while being attacked. It must also be scalable and should protect, to some degree, against newer, more advanced types of security threats.

Along with intrusion prevention, another useful tool for the home user is to become familiar with some of the tricks and techniques that hackers use to break into systems. Some of these tricks include scanning systems for weak spots, like an operating system that has not been upgraded or recently patched, or the use of malware to record important information from the computer (e.g., passwords or financial information). There are many tools that the hacker employs to gain unauthorized access to systems across the Internet. Remember that a system may not always be attacked to steal information; it may also be attacked to be used as a storage site for illegal content (such as pirated movie downloads) or a system could be recruited into an online 'bot army.'

To increase security of the home computer, the home user can take a few relatively simple steps. One of the first steps in computer hacking prevention is to make sure that all of your software is up-to-date. Many users have suffered attacks from malicious code that has already been identified and protected against. A new patch will come out for a given piece of software that protects against a recent virus, but if the home user does not download the patch, then that user is susceptible to viruses or malicious code.

Another measure that any home user may take is to install a firewall. The firewall’s purpose is to stop unauthorized contact or entry onto the system. However, a firewall does not remove things that are already on the computer or network. Anti-virus software is needed as well to handle malicious code that may slip through the firewall undetected.

Different applications on the market will scan and remove malicious code that has found its way onto a hard drive. Running various virus software applications yields benefits as well. Different software will detect different malware (Hackingalert, 2008). The whole problem with cyber-security presently is that since the cyber-criminal is constantly upgrading his knowledge and methods, most intrusion prevention software applications only deal with the methods previously used.

The home user may benefit by subscribing to any one of a variety of newsletters that stay abreast of the hacker world. One such free newsletter is offered by Hackingalert.com.

Overall, the user must take a large role in understanding the issues regarding cyber security and implementing their solutions.


Cyber-Media (2006). Increase in cyber attack against home users Retrieved November 29, 2008, from http://www.ciol.com/ciol-techportal/Content/Security/News/2006/2061010859.asp

Top Layer Security (2008). Securing tomorrow’s networks today. Retrieved November 29, 2008, from http://www.toplayernetworks.com/content/resource/faq.jsp.

Hackingalert (2008). Hacker tricks and prevention techniques. Retrieved November 29, 2008, from http://www.hackingalert.com/hacking-articles/hacker-tricks.php.

Suggested Reading from Inquiries Journal

Today, we live in the aftermath of the Internet revolution. Humanity has never before been more interconnected or had as much access to the same tools and information. As a driving force behind globalization and modern progress, the Internet enables instant communication and access to information while providing a new medium for... MORE»
Advertisement
Cybersecurity is presented in the growing literature on the subject as an essentially "slippery" object for state security.1 The Internet puts a lot of stress on the conventional conception of state security as the insurance... MORE»
Cyber security is a compelling problem for scholars of International Politics. Internet technology is so thoroughly integrated into civil society, commerce, governance, critical infrastructures, intelligence collection and law enforcement that the stakeholders necessary to cyber security practices and policies are diverse and complex... MORE»
There is a widespread belief that as societies and governments become increasingly reliant upon information technology, they in turn are becoming more vulnerable to a whole range of cyber-threats.1 Whether these dangers are capable of generating enough damage to warrant a redistribution of government resources is the question at the heart of this essay. This paper provides an evaluation of the cyber-threat arguing that it deserves recognition as... MORE»
Submit to Inquiries Journal, Get a Decision in 10-Days

Inquiries Journal provides undergraduate and graduate students around the world a platform for the wide dissemination of academic work over a range of core disciplines.

Representing the work of students from hundreds of institutions around the globe, Inquiries Journal's large database of academic articles is completely free. Learn more | Blog | Submit

Follow IJ

Latest in Computer Science

2009, Vol. 1 No. 11
The earliest form of cryptography was the simple writing of a message, as most people could not read (New World, 2007). In fact, the very word cryptography comes from the Greek words kryptos and graphein, which mean hidden and writing, respectively... Read Article »
2015, Vol. 7 No. 10
Considering information is the most valuable asset of any organization, information security is one of the most important areas for every business and individual. Looking at the big picture, approximately 86% of all websites had a serious vulnerability... Read Article »
2012, Vol. 4 No. 04
Today, we live in the aftermath of the Internet revolution. Humanity has never before been more interconnected or had as much access to the same tools and information. As a driving force behind globalization and modern progress, the Internet enables... Read Article »
2009, Vol. 1 No. 11
With the explosion of the use of the Internet for nearly all forms of negotiable instrument exchange, the constant transmission of time sensitive and vital corporate communications, and the ubiquitous presence of malicious software writers, verifying... Read Article »
2009, Vol. 1 No. 11
Multiple undersea internet cables were mysteriously severed and subsequently gained significant attention in the beginning of 2008. The attacks on those cables highlighted the enormous amount of internet traffic that uses the undersea cable system... Read Article »

What are you looking for?

FROM OUR BLOG

7 Big Differences Between College and Graduate School
How to Select a Graduate Research Advisor