Week Case Study Assignment

Week Case Study Assignment Words: 424

Computer security is not an issue for organizations alone. Anyone whose personal computer is connected to a network or the Internet faces a potential risk of attack. Identify all the potential security threats on a personal computer. Identify some of the techniques an attacker might employ to access information on the system. Home computing has security issues quite different from yet includes all of the ones we face at work. At work Network Administrators secure everything for us and limit what we can access. Many people are not aware of what should be done or how to do it at home to assure the same level of security.

One of the most basic things we need to do at home is to setup a router and firewall. Many people are not aware of the security risks of not using a firewall at home. Firewalls act as shields from unwanted traffic and intrusion. There are many types Of packets that a well setup firewall can defend us from without our even knowing. Securing the router with passwords was also something that for a number of years in the early days of home computing that not many people were aware of. As a consequence home networks were left wide open for anyone to connect to and explore.

Don’t waste your time!
Order your assignment!


order now

Once inside they will ave access to any machine also on that network. Another risk is spoofed attacks. Many people fall victims to banner ads on the internet that trick unknowing users into clicking on them and installing what they think is an essential software update to legitimate software. Often times however it may actually be some type of virus, malware, or root kit. A root kit is the most dangerous of those possibilities. Once installed a root kit can do any manner of things to your system. They can turn off all antivirus software they may be installed, or simply prevent that software from updating itself.

They can even go as far as to render your system totally useless. The best way to avoid this is by going directly to the software developers website to get your updates when prompted by a popup. This way you ensure that it is legitimate. All the attacks mentioned in the previous assignments and blog posts will still be an issue as well to include ping sweeps and port scans. This time however it’s up to you to harden your home system. Always remove unused software and close unused ports.

How to cite this assignment

Choose cite format:
Week Case Study Assignment. (2022, Feb 22). Retrieved April 26, 2024, from https://anyassignment.com/samples/week-case-study-3-10227/