preview

Challenges And Existing Flaws Within The Provided Home Network Setup

Better Essays

This report presents an analysis of the current problems and existing flaws within the provided home network setup. The immediate objective of this report is to help resolve user’s current network issues and to provide advice on setting up a healthy and secured home network. The secondary objective of this report is to raise user’s cybersecurity awareness and to educate user on cybersecurity related topics through various discussions. This report is meant to provide reader with a broad understanding across various cybersecurity related topics. To gain in-depth understanding of related topics, readers are recommended to do further readings in supplementary to this report. A list of further readings of related topics are included in annex A …show more content…

Common cyber-threats will also be briefly discussed to provide a context to the importance of cybersecurity.

I. Introduction

In today’s digital age, the Internet has become an integral part of life. From emailing and instant messaging to banking and submitting tax, nearly every aspect of our life revolves around the cyber world. While the Internet had provided us with great accessibility and convenience over the years, it also exposes us to cyberthreats. All sensitive information such as passwords and personal financial details sent using the internet are subjected to cyber threats to a certain extend []. When stolen, such information can be used against us, affect user’s life. Therefore it is crucial to understand how to protect information from exploitations.

Cyber criminals usually gain access to computers by planting malicious logic (like a virus or malware) into the net and waits for users to open the virus. Common ways a computer can become infected are:

Opening an infected email attachment.
Visiting a malicious website.
Clicking on a malicious link.
Inadvertently downloading a harmful program.

Cyber security is widely regarded as a balance between confidentiality, integrity and availability (CIA). They are defined as follows:

Confidentiality : The ability to hide information from those people unauthorised to view

Get Access