Velocity Reviews - Computer Hardware Reviews

Velocity Reviews > Newsgroups > Computing > Computer Security > Types of Attacks possible on a home computer..

Reply
Thread Tools

Types of Attacks possible on a home computer..

 
 
Sivasubramanian
Guest
Posts: n/a
 
      04-08-2007
Network Security threats for a large network with ample processing
power storing valuable or sensitive data is more easily understood
than the threats to standalone home computers.

Finding vulnerabilites in and attacking a large network is possibly
worthwhile for the that specifi network's enemy ( for e.g a direct
business competitior) who has a specific purpose or for the hacker who
is not a specific enemy. But is it worthwhile for hackers or hacking
groups to attack a standalone, connected to the Internet ? The
question is worded like this to ask "Is a home computer less prone to
be attacked ? and "Is a home computer less attractive for a hacker ? "

Take the case of a desktop computer of average configuration, owned by
an average citizen of no significance in terms of wealth or power or
fame, who does not use a credit card and does not shop online. The
user does not have a reason to be a specific target by an "enemy".

Why would his computer be compromised ? What is the purpose ? What are
the types of attacks ? And of what use to the hacker is the
information collected? What use are the computing resources of a
totally hacked PC of this unsuspecting user ?

 
Reply With Quote
 
 
 
 
nemo_outis
Guest
Posts: n/a
 
      04-08-2007
"Sivasubramanian" <(E-Mail Removed)> wrote in
news:(E-Mail Removed) ps.com:

> Network Security threats for a large network with ample processing
> power storing valuable or sensitive data is more easily understood
> than the threats to standalone home computers.
>
> Finding vulnerabilites in and attacking a large network is possibly
> worthwhile for the that specifi network's enemy ( for e.g a direct
> business competitior) who has a specific purpose or for the hacker who
> is not a specific enemy. But is it worthwhile for hackers or hacking
> groups to attack a standalone, connected to the Internet ? The
> question is worded like this to ask "Is a home computer less prone to
> be attacked ? and "Is a home computer less attractive for a hacker ? "
>
> Take the case of a desktop computer of average configuration, owned by
> an average citizen of no significance in terms of wealth or power or
> fame, who does not use a credit card and does not shop online. The
> user does not have a reason to be a specific target by an "enemy".
>
> Why would his computer be compromised ? What is the purpose ? What are
> the types of attacks ? And of what use to the hacker is the
> information collected? What use are the computing resources of a
> totally hacked PC of this unsuspecting user ?



Even if you have nothing worth stealing *from* your computer you may
nonetheless have considerable attraction for unknowing recruitment into a
bot net. This is so widespread even the major media have written about
it for years. Quickie examples (there are scads more!) follow:

http://news.bbc.co.uk/2/hi/business/6298641.stm

http://news.bbc.co.uk/2/hi/technology/4685238.stm

http://news.bbc.co.uk/2/hi/technology/4354109.stm

http://news.bbc.co.uk/2/hi/technology/5414502.stm

Regards,




 
Reply With Quote
 
 
 
 
David H. Lipman
Guest
Posts: n/a
 
      04-08-2007
From: "Sivasubramanian" <(E-Mail Removed)>

| Network Security threats for a large network with ample processing
| power storing valuable or sensitive data is more easily understood
| than the threats to standalone home computers.
|
| Finding vulnerabilites in and attacking a large network is possibly
| worthwhile for the that specifi network's enemy ( for e.g a direct
| business competitior) who has a specific purpose or for the hacker who
| is not a specific enemy. But is it worthwhile for hackers or hacking
| groups to attack a standalone, connected to the Internet ? The
| question is worded like this to ask "Is a home computer less prone to
| be attacked ? and "Is a home computer less attractive for a hacker ? "
|
| Take the case of a desktop computer of average configuration, owned by
| an average citizen of no significance in terms of wealth or power or
| fame, who does not use a credit card and does not shop online. The
| user does not have a reason to be a specific target by an "enemy".
|
| Why would his computer be compromised ? What is the purpose ? What are
| the types of attacks ? And of what use to the hacker is the
| information collected? What use are the computing resources of a
| totally hacked PC of this unsuspecting user ?

There are MANY reasons to attack a "home" PC vs. a coporate server.
Here are a few reasons...

- Identity theft
- SpamBOT
- Zombie service
- Proxy Server
- Virus distribution

--
Dave
http://www.claymania.com/removal-trojan-adware.html
http://www.ik-cs.com/got-a-virus.htm


 
Reply With Quote
 
Sivasubrmanian
Guest
Posts: n/a
 
      04-08-2007
Dear Nemo_outis and David Hepman,

Thank you for your response and for the useful liks. Very informative
and I learnt a lot.

Thank you.

 
Reply With Quote
 
 
 
Reply

Thread Tools

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are Off


Similar Threads
Thread Thread Starter Forum Replies Last Post
Security attacks you can't stop: targeted Office attacks Au79 Computer Support 5 03-15-2007 10:57 PM
Filter user entered Html for possible Cross Site Scripting attacks emer.kurbegovic@gmail.com ASP .Net 0 08-14-2006 09:25 PM
Can XSD simple types be derived from complex types? Soren Kuula XML 2 12-01-2005 07:51 PM
Where are ref types that are members of value types stored? Sathyaish ASP .Net 2 05-22-2005 07:32 PM
STD types vs C++ intrinsic types Jeremy Cowles C++ 5 08-19-2003 05:33 PM



Advertisments