This report presents an analysis of the current problems and existing flaws within the provided home network setup. The immediate objective of this report is to help resolve user’s current network issues and to provide advice on setting up a healthy and secured home network. The secondary objective of this report is to raise user’s cybersecurity awareness and to educate user on cybersecurity related topics through various discussions. This report is meant to provide reader with a broad understanding across various cybersecurity related topics. To gain in-depth understanding of related topics, readers are recommended to do further readings in supplementary to this report. A list of further readings of related topics are included in annex A …show more content…
Common cyber-threats will also be briefly discussed to provide a context to the importance of cybersecurity.
I. Introduction
In today’s digital age, the Internet has become an integral part of life. From emailing and instant messaging to banking and submitting tax, nearly every aspect of our life revolves around the cyber world. While the Internet had provided us with great accessibility and convenience over the years, it also exposes us to cyberthreats. All sensitive information such as passwords and personal financial details sent using the internet are subjected to cyber threats to a certain extend []. When stolen, such information can be used against us, affect user’s life. Therefore it is crucial to understand how to protect information from exploitations.
Cyber criminals usually gain access to computers by planting malicious logic (like a virus or malware) into the net and waits for users to open the virus. Common ways a computer can become infected are:
Opening an infected email attachment.
Visiting a malicious website.
Clicking on a malicious link.
Inadvertently downloading a harmful program.
Cyber security is widely regarded as a balance between confidentiality, integrity and availability (CIA). They are defined as follows:
Confidentiality : The ability to hide information from those people unauthorised to view
According to the Federal Trade Commission Identity theft is the fastest growing crime in the United States of America. They estimated that 10 million people a year are victimized by the crime which comes out to about 19 people per minute are becoming victims of this crime. Given these extremely worrying statistics it has never been more important to be informed about the crime of identity theft and how to avoid it in your daily life especially as more schemes and ways to unknowingly forfeit your information are introduced with the prevalence of the World Wide Web (www, w3). More than just knowledge of the crime of identity theft it is also important to know what protections you can set to help protect your information. Also, given the amount of businesses and organizations, and the various vulnerabilities that their systems may have, that must have access and know significant information about your life it is also invaluable to understand how to recover from your information being lost. This paper will be used to inform about this growing crime including what identity theft is and the different types that exist, what information is most important to protect, what you can do to avoid it, how to recover from it and what that may entail, and how this applies to the field of computer science and what should be looked for when building systems, and different kinds of attacks that can happen.
As the technology is increasing day by day, many people fall victim to cyber theft. This high development of technology and the availability of internet to most of the public, broadens the pathway of cyber-crime. Cyber-Security was once not a serious issue. But, now many people are complaining about their credit card information getting stolen or sudden drop of credits in their bank account. The internet has become the integral part of today’s generation of people. Many people share their information out in the web through social networking sites like Facebook, Twitter, Snapchat, Instagram etc. Internet has touched every aspect of life right from the beginning to the present. As people share their personal information online; most of their accounts get hacked by cyber-criminal or in other words black hat hackers. And, trusting internet nowadays isn't a wise thing to do.
The Internet is undoubtedly one of the most provocative sociological and psychological phenomena. Often the Internet says that it links all those fallen communicators who cannot cope in the real world. Socializing and surfing online space does not pass without leaving a trace. Each user provides information about themselves, sometimes as a condition to be able to access the required application, when consciously accedes to it, sometimes exchanging information with other members of the network, unaware that the network "remembers everything", that data remains deposited even when its removed profile. However, more often we are faced with data theft and identity by criminal hacker groups. Cyber security is a challenge that will have to be resolved
The immediate cyber threats to national security has been assessed as high. Cyber security threats are increasing in the number, type and sophistication of the threat. Although a detailed analysis is currently being developed, the ACSC’s Threat Report 2015 predicts the following attributes of cybercrime to increase in the coming decade.
Viruses get into the computer system by many different ways, it can be through downloading infected files online, opening unknown links or downloading attachments files from emails.
This memorandum is written to reveal the vulnerabilities of the current state of the United States’ cyber security. It will also specify policy options that can be taken in order to improve the current policy. Cyber security focuses on protecting computers, networks, databases, and programs from unauthorized access or change. Changes need to be made in cyber security as soon as possible if the United States wants to be secure.
homeland and U.S. vital interests from disruptive or destructive cyber attacks of significant consequence. (INSA 2011,17)
With the increase in information technology and internet usage, the likelihood of becoming a victim of identity theft has significantly increased over that past several years. Placing an emphasis on protecting yourself in the online world, can be deemed just as important as protecting yourself in a physical environment. Hackers employ many tactics to compromise your personal information used to commit identity theft, fraud, or other crimes. However, there are many easy and safe practices when it comes to protecting yourself, and if followed can give you a significant advantage in preventing compromise of Personally Identifiable Information.
When establishing a home network it is important that you evaluate the needs you have for all of the users in your household as well as backup options and how we will connect to the network and the security of your network. I will be looking at developing such a network for my home using the given budget of $1,000 and explain why my choices will meet my networking needs as well as looking to see what changes could be made over time if given a larger budget to work with.
GLOBAL CYBER THREAT LANDSCAPE AND WHICH CYBER THREATS ARE THE MOST CRITICAL TO THE UNITED STATES
Today, users of online services are very familiar with the process of typing in a username and password, to securely access their accounts. Passwords however, are no longer considered very safe, as they can be easily stolen, sniffed, guessed, or obtained through methods such as phishing and malware attacks. Even strong and complicated passwords are susceptible to theft and therefore not the best line of defense against hackers. That’s why online service providers including banks, social media websites, e-commerce portals, and email providers, among others, all understand the need to protect the confidential data of their customers
Cyber security includes ensuring the data, frameworks we depend on consistently—whether at home, work or school. Consider the amount of your own data is put away either all alone PC or on somebody else 's framework. How is that information and the frameworks on which that information lives (or is transmitted) kept secure? The expanding volume and modernity of digital security threats–including focusing on phishing tricks, information robbery, and other online vulnerabilities–demand that we stay cautious about securing our frameworks and data. The normal unprotected associated with the Internet can be hacked in minutes. A great deal of computers and website pages are being found with viruses each day. New hacking strategies are invented constantly. These are only a couple case of hacking we hear about and they highlight the significance of data security as an essential way to deal with securing information and frameworks.
The increasing volume and sophistication of cyber security threats including targeted data theft, phishing scams and other online vulnerabilities demand that we remain vigilant about securing our systems and information.
Since the late 1980’s, cyber security has been a growing industry. Viruses such as the Morris Worm proved to the world that the internet was not a safe and secure architecture. In later years the Michelangelo virus, Melissa, and Concept began to push the IT industry for research on cyber security and antivirus protection.
In some cases, the computer may have been used in order to commit the crime, and in other cases the computer may have been the target of the crime. Cybercrime first started with hackers trying to break into computer networks. Some did it just for the thrill of accessing high level security networks, but others sought to gain sensitive, classified material. Eventually, criminals started to infect computer systems with computer viruses led to breakdowns on personal and business computers. Computer viruses are forms of code or malware programs that can copy themselves and damage or destroy data and systems. When computer viruses are used on a large scale like with bank government or hospital networks, these actions may be categorized as cyberterrorism. Computer hackers also engage in phishing scams, like asking for bank account numbers and credit card theft (What is Cybercrime?,