Preview

Cmgt/441 Week 3

Good Essays
Open Document
Open Document
768 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cmgt/441 Week 3
Week 3 Individual Assignment: Attack Prevention

Steve Morozov

CMGT/441 University of Phoenix

Cyber Attack Prevention for the Home User: How to Prevent a Cyber Attack

Introduction
In the article by Tony Damico the claim is mad that the home user is the most vulnerable of networks and is open to most of attacks out there. I tend to agree. The article states that these home users have the poorest security measures in place, thus making them a widely targeted group. In my personal experience, I have dealt with my own attack problems in the past and worked with others who have had their own myriad of problems and experiences with this.
Prevention
At the time of this article writing, 86% of all attacks were aimed at home users. This article is from 2006, most likely the percentage is higher now. The article states that the home user does not take control and utilize their home firewall or antivirus software. To this end, I agree because most of my users that I have helped never opened their firewall or even heard of anti-virus.
The author makes note what the difference between a detection and prevention system is. Prevention systems automatically detect and block malicious network and application traffic, while allowing legitimate traffic to continue through to its destination. A detection system just detects and would rely on the prevention system to act on it. The prevention system is said to block bad malevolent code and cannot block good code at the same time, while allowing for protection of newer and more advanced types of security threats. The users should get to know what they weak spots of their system are in order to familiarize themselves with the dangers. Author Posey states in his article 10 best practices for Windows security, “Reduce the attack surface, the code that’s running on a machine, the greater the chance that the code will be exploitable…Uninstall any necessary operating system components and applications”, (Posey, 2011). More



References: Damico , T. (2008, December 8). Cyber attack prevention for the home user: how to prevent a cyber attack. Student Pulse , Retrieved from http://www.studentpulse.com/articles/47/cyber-attack-prevention-for-the-home-user-how-to-prevent-a-cyber-attack# Posey, B. (2011, March 11). 10 best practices for windows security. Tech republic, Retrieved from http://www.techrepublic.com/blog/10things/10-best-practices-for-windows-security/2383 Symantec, Initials. (n.d.). Cyber attacks increasingly target home users for financial gain . Retrieved from http://complianceandprivacy.com/News-Symantec-report-home-users.asp

You May Also Find These Documents Helpful

  • Good Essays

    is4680 lab #2

    • 630 Words
    • 2 Pages

    Windows Hardening Defense, starts with the basics, Log in with least amount of privileges. Always use Firewall and AV. Monitor channels for security advisories and alerts. Know your system(s). Patch early and patch often, Unpatched Systems are the lowest of low hanging fruit. Have a patch policy documented and stick with it. Review patches as they are released and determine criticality based on the exploit, threat footprint for your system(s), and whether or not there is a POC or fully weapon exploit in the wild. When possible, test patches before rolling out in production on servers. Most clients should have automatic updates enabled for the OS and any application listening on a socket or used with untrusted data (java, adobe, browsers, etc...) Servers should be updated during maintenance windows if possible and depending on criticality (of threat and server).…

    • 630 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    planned expansion into the east coast. One of the threats identified was the vulnerability of the…

    • 2750 Words
    • 15 Pages
    Powerful Essays
  • Good Essays

    Nt1330 Unit 3 Assignment 1

    • 2755 Words
    • 12 Pages

    My firewall may be effective at blocking some attacks and offering a certain amount of protection. But a firewall does not guarantee that your computer will be attacked. In particular, a firewall offers little to no protection against viruses. However using a firewall in conjunction with other protective software and safe practices will strengthen resistance to attacks. Anti-virus software details vary between packages but basically it scans files on your computer’s memory for certain patterns that may indicate an infection, looking for signatures, or definitions, of known viruses. Authors for viruses are continually being updated and released, so it’s important you have the latest definitions installed so the software can tackle any threat new or old. Each virus software has its own method of response once it locates a virus, and the action may vary according to when it finds the virus either during an automatic or a manual scan. Most software produces a dialog box alerting you if it has found a virus and asks whether you want it to clean the file or remove it. Some software may attempt to remove the virus without first asking. A good user should familiarize themselves with the features so they know how to handle such a…

    • 2755 Words
    • 12 Pages
    Good Essays
  • Satisfactory Essays

    The article was considerably valid as was demonstrated by credible news programs and other articles. The importance of keeping patches and antivirus signatures up to date, to help prevent these types of attacks was discussed in detail. Users selecting strong passwords was also discussed, and revealed as a key component in the ability to compromise these accounts. This article was valuable and affected a lot of people. It is clear that there are prevention methods that can be used, to secure your…

    • 605 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    A cyber-attack is a deliberate exploitation of computer systems, technology-dependent enterprises, and networks (Janssen, n.d.). There are 11 potential security threats thought to be the top security threats for 2013; targeted attacks and cyber-espionage, hacktivism, nation-state-sponsored cyber-attacks, legal surveillance tools, clouds and malware, privacy threats, fake security certificates, ransomeware spreading globally, MAC OS malware, mobile malware, and vulnerabilities and exploits (Davis, 2013). Symantec’s 2013 Internet Security Threat report finds that there was a 42% increase in targeted attacks in 2012…

    • 1317 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Week3 Hacking

    • 391 Words
    • 2 Pages

    Workstation and Desktop devices are prone to viruses, malware, and malicious software, especially if the user surfs the Internet and World Wide Web. Given that users connect to the Internet and World Wide Web, what security countermeasures can organization implement to help mitigate the risk caused from viruses, malware, and malicious software?…

    • 391 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Cis 105 Security Systems

    • 465 Words
    • 2 Pages

    With the variety of threats to worry about in regards to protecting one’s computer system, whether it is for a personal or business computer, it is very important to get some type of security protection. There are a lot of options out there in terms of what brand and what level of security an individual is looking for. The best option to protect a computer system from various threats is an all-in-one computer security system, such as Norton 360 and McAfee Total Protection. One problem an individual needs to worry about is identity theft. Identity theft problems can range from a stealing a person’s name, email address, physical address, credit card information, account numbers, documents, and even passwords. Other threats or annoyances to worry about are spyware, adware, pop-ups, spam, viruses, and worms. Keeping the computer system and the data contained protected within the computer is important.…

    • 465 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    SEC 280 Week 4 Case Study

    • 425 Words
    • 2 Pages

    One of the most basic things we need to do at home is to setup a router and firewall. Many people are not aware of the security risks of not using a firewall at home. Firewalls act as shields from unwanted traffic and intrusion. There are many types of packets that a well setup firewall can defend us from without our even knowing. Securing the router with passwords was also something that for a number of years in the early days of home computing that not many people were aware of. As a consequence home networks were left wide open for anyone to connect to and explore. Once inside they will have access to any machine also on that network.…

    • 425 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    caregroup

    • 721 Words
    • 4 Pages

    firewalls should be installed along with antivirus software at the user end that is updated and…

    • 721 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Defense against web attacks is a key element in a security professional’s skill set. For this assignment, your manager has asked you to review the Aim Higher College’s Web server and application security and to suggest appropriate defenses. For each of the following scenarios, explain what the threat or threats are, what defenses you would recommend, and why.…

    • 1988 Words
    • 8 Pages
    Better Essays
  • Better Essays

    Stallings, W., & Brown, L. (2012) Computer security: Principles and practice (2nd ed.). Boston, MA: Pearson.…

    • 1167 Words
    • 4 Pages
    Better Essays
  • Good Essays

    [Us as] security professional need to be aware of common attack methods so that they can take proactive steps to prevent attacks [by recognizing] them when they occur and respond [to them] appropriately (James M. Stewart, p. 48).…

    • 1033 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Incident response begins with prevention and security awareness (figure 1). In the case of malware attacks such as viruses, worms or Trojan horses, defense-in-depth plays a large role in the defense and early detection of potential threats to information systems connected to the internet. Personnel utilizing these assets also play a large role in defending and protecting these assets. Authorized users should be aware of all policies and procedures pertaining to the proper use of all networks, applications, and systems within the organization. The frequency of incidents can be greatly reduced through user awareness (Whitman, Mattord, & Green, 2014).…

    • 805 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Riordan Sr-Rm-013

    • 722 Words
    • 3 Pages

    As said by Roger Thompson, chief research officer of AVG, rouge antivirus products are common” The Bad guys are clearly making money at it”. Who hasn’t seen those much hated pop ups stating your computer is infected and needs a scan? Who now is silly enough to actually click on those? One would be surprised. Given that this article was written in 2009, it is still very relevant, and it seems like the more and more we still can’t seem to slow down those pop ups. Although now it seems like those pop ups come out of nowhere without you…

    • 722 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    From the year 2000 to 2010, the users’ on the Internet has escalated to approximately five times its original users. The Internet provides a variety of services in which its users transmits large amounts of proprietary and personal data. The increase in Internet users and the vital data transmitted has enticed criminals to use the internet to obtain vital information. This is done through the use of malicious traffic. Malicious traffic can be defined as Internet traffic used to compromise a system and/or to conceivably impair the privacy of consumers data stored on the system or the person working on the system itself. Security experts has documented "67,000 new malware threats on the Internet daily in the first quarter of 2011, resulting from more than 45 new viruses, worms, spyware and other threats" (Department of Commerce (DOC), 2011). Malicious traffic plays a key role in the challenges faced in the economics of information security. Economically speaking, malicious traffic…

    • 1586 Words
    • 7 Pages
    Powerful Essays