Types of Attacks possible on a home computer..

Discussion in 'Computer Security' started by Sivasubramanian, Apr 8, 2007.

  1. Network Security threats for a large network with ample processing
    power storing valuable or sensitive data is more easily understood
    than the threats to standalone home computers.

    Finding vulnerabilites in and attacking a large network is possibly
    worthwhile for the that specifi network's enemy ( for e.g a direct
    business competitior) who has a specific purpose or for the hacker who
    is not a specific enemy. But is it worthwhile for hackers or hacking
    groups to attack a standalone, connected to the Internet ? The
    question is worded like this to ask "Is a home computer less prone to
    be attacked ? and "Is a home computer less attractive for a hacker ? "

    Take the case of a desktop computer of average configuration, owned by
    an average citizen of no significance in terms of wealth or power or
    fame, who does not use a credit card and does not shop online. The
    user does not have a reason to be a specific target by an "enemy".

    Why would his computer be compromised ? What is the purpose ? What are
    the types of attacks ? And of what use to the hacker is the
    information collected? What use are the computing resources of a
    totally hacked PC of this unsuspecting user ?
     
    Sivasubramanian, Apr 8, 2007
    #1
    1. Advertising

  2. Sivasubramanian

    nemo_outis Guest

    "Sivasubramanian" <> wrote in
    news::

    > Network Security threats for a large network with ample processing
    > power storing valuable or sensitive data is more easily understood
    > than the threats to standalone home computers.
    >
    > Finding vulnerabilites in and attacking a large network is possibly
    > worthwhile for the that specifi network's enemy ( for e.g a direct
    > business competitior) who has a specific purpose or for the hacker who
    > is not a specific enemy. But is it worthwhile for hackers or hacking
    > groups to attack a standalone, connected to the Internet ? The
    > question is worded like this to ask "Is a home computer less prone to
    > be attacked ? and "Is a home computer less attractive for a hacker ? "
    >
    > Take the case of a desktop computer of average configuration, owned by
    > an average citizen of no significance in terms of wealth or power or
    > fame, who does not use a credit card and does not shop online. The
    > user does not have a reason to be a specific target by an "enemy".
    >
    > Why would his computer be compromised ? What is the purpose ? What are
    > the types of attacks ? And of what use to the hacker is the
    > information collected? What use are the computing resources of a
    > totally hacked PC of this unsuspecting user ?



    Even if you have nothing worth stealing *from* your computer you may
    nonetheless have considerable attraction for unknowing recruitment into a
    bot net. This is so widespread even the major media have written about
    it for years. Quickie examples (there are scads more!) follow:

    http://news.bbc.co.uk/2/hi/business/6298641.stm

    http://news.bbc.co.uk/2/hi/technology/4685238.stm

    http://news.bbc.co.uk/2/hi/technology/4354109.stm

    http://news.bbc.co.uk/2/hi/technology/5414502.stm

    Regards,
     
    nemo_outis, Apr 8, 2007
    #2
    1. Advertising

  3. From: "Sivasubramanian" <>

    | Network Security threats for a large network with ample processing
    | power storing valuable or sensitive data is more easily understood
    | than the threats to standalone home computers.
    |
    | Finding vulnerabilites in and attacking a large network is possibly
    | worthwhile for the that specifi network's enemy ( for e.g a direct
    | business competitior) who has a specific purpose or for the hacker who
    | is not a specific enemy. But is it worthwhile for hackers or hacking
    | groups to attack a standalone, connected to the Internet ? The
    | question is worded like this to ask "Is a home computer less prone to
    | be attacked ? and "Is a home computer less attractive for a hacker ? "
    |
    | Take the case of a desktop computer of average configuration, owned by
    | an average citizen of no significance in terms of wealth or power or
    | fame, who does not use a credit card and does not shop online. The
    | user does not have a reason to be a specific target by an "enemy".
    |
    | Why would his computer be compromised ? What is the purpose ? What are
    | the types of attacks ? And of what use to the hacker is the
    | information collected? What use are the computing resources of a
    | totally hacked PC of this unsuspecting user ?

    There are MANY reasons to attack a "home" PC vs. a coporate server.
    Here are a few reasons...

    - Identity theft
    - SpamBOT
    - Zombie service
    - Proxy Server
    - Virus distribution

    --
    Dave
    http://www.claymania.com/removal-trojan-adware.html
    http://www.ik-cs.com/got-a-virus.htm
     
    David H. Lipman, Apr 8, 2007
    #3
  4. Dear Nemo_outis and David Hepman,

    Thank you for your response and for the useful liks. Very informative
    and I learnt a lot.

    Thank you.
     
    Sivasubrmanian, Apr 8, 2007
    #4
    1. Advertising

Want to reply to this thread or ask your own question?

It takes just 2 minutes to sign up (and it's free!). Just click the sign up button to choose a username and then you can ask your own questions on the forum.
Similar Threads
  1. =?Utf-8?B?RGFycmFu?=

    Smurf Attacks

    =?Utf-8?B?RGFycmFu?=, Jan 4, 2005, in forum: Wireless Networking
    Replies:
    3
    Views:
    7,151
    =?Utf-8?B?RGFycmFu?=
    Jan 6, 2005
  2. =?Utf-8?B?TWFkRG9n?=

    Zone Alarm Firewall Attacks

    =?Utf-8?B?TWFkRG9n?=, Oct 12, 2005, in forum: Wireless Networking
    Replies:
    4
    Views:
    8,262
    N. Miller
    Oct 13, 2005
  3. J Bard

    TACACS attacks .

    J Bard, Nov 20, 2003, in forum: Cisco
    Replies:
    3
    Views:
    761
    Colin
    Nov 24, 2003
  4. mickcant

    TV card in computer and Video file types.

    mickcant, Jan 21, 2004, in forum: Computer Support
    Replies:
    3
    Views:
    583
  5. Au79
    Replies:
    5
    Views:
    817
    Fuzzy Logic
    Mar 15, 2007
Loading...

Share This Page