Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 31742
Quick Reference: Cyber Attacks Awareness and Prevention Method for Home Users

Authors: Haydar Teymourlouei

Abstract:

It is important to take security measures to protect your computer information, reduce identify theft, and prevent from malicious cyber-attacks. With cyber-attacks on the continuous rise, people need to understand and learn ways to prevent from these attacks. Cyber-attack is an important factor to be considered if one is to be able to protect oneself from malicious attacks. Without proper security measures, most computer technology would hinder home users more than such technologies would help. Knowledge of how cyber-attacks operate and protective steps that can be taken to reduce chances of its occurrence are key to increasing these security measures. The purpose of this paper is to inform home users on the importance of identifying and taking preventive steps to avoid cyberattacks. Throughout this paper, many aspects of cyber-attacks will be discuss: what a cyber-attack is, the affects of cyber-attack for home users, different types of cyber-attacks, methodology to prevent such attacks; home users can take to fortify security of their computer.

Keywords: Cyber-attacks, home user, prevention, security, technology.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1338144

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 7073

References:


[1] CSID. (2012, September). CONSUMER SURVEY:. Retrieved from CSID:http://www.csid.com/wpcontent/ uploads/2012/09/CS_PasswordSurvey_FullReport_FINAL.pdf
[2] (2014). Cisco 2014 annual security report. Retrieved from http://www.cisco.com/web/offer/gist_ty2_asset/Cisco_2014_ASR.pdf
[3] Indiana University. (2014, November 12). What are phishing scams and how can I avoid them? Retrieved from Indiana University Knowledge Base: https://kb.iu.edu/d/arsf
[4] Musil, S. (2013, August 21). Cybercrooks use DDoS attacks to mask theft of banks' millions. Retrieved from CNET: http://www.cnet.com/news/cybercrooks-use-ddos-attacks-to-mask-theftof- banks-millions/
[5] Pennsylvannia State University. (2013, March 14). Types of Attacks. Retrieved from Pennsylvannia State University Personal Web Servers: http://www.personal.psu.edu/users/j/m/jms6423/Engproj/Types%20of% 20Attacks.xhtml
[6] Schwarz, C. D. (2014, December 26). 5 ways to prevent a personal cyber attack. Retrieved from http://hereandnow.wbur.org/2014/12/26/cybersecurity- sony
[7] Selinger, M. (2013, 12 04). Adobe & java make windows insecure. Retrieved from http://www.av-test.org/en/news/news-singleview/ adobe-java-make-windows-insecure/
[8] Stone, D. (2015). Detecting Cyber Attacks. Retrieved from Everyday Life - Global Post: http://everydaylife.globalpost.com/detecting-cyberattacks- 30915.html
[9] U.S. Department of Homeland Security, Federal Emergency Management Agency. (2013). Cyber attack. Retrieved from website: http://m.fema.gov/cyber-attack