Presentation is loading. Please wait.

Presentation is loading. Please wait.

Home Internet Vulnerabilities

Similar presentations


Presentation on theme: "Home Internet Vulnerabilities"— Presentation transcript:

1 Home Internet Vulnerabilities
Hector Rivera – IASP 470

2 Introduction Due to the increasing demand and production of internet-based devices (IoT), smart devices on a home-based internet has seen impressively increased attacks from hackers daily. Using cloud-based internet in homes, vulnerabilities through newly designed appliances, video games, and other mobile devices have multiple attack points that could be exploited through various network layers. Through this research, topics will cover the likelihood of an attack and measure that can be taken to prevent an attack occurring in the home.

3 Framework of a Home Internet
Home internet system contains four attack layers Most home internet systems are composed of: smart terminals communication networks Cloud internet Controller APPs The router is an important piece of equipment that manages network layer connectivity between a WAN and LAN

4 Common Attacks Social engineering - method used by many attackers to gain access to unauthorized information or systems. While unethical, many attackers use this method as part of their penetration testing. Hackers employ techniques such as Deception Bribery Impersonation

5 Common Attacks Other methods to collect data that employed would include - Spear Phishing – using either or social media as a trusted source for individuals to click on links to gain access or download malicious code. TCP Session Hijacking - a hacker compromises a session token (either confiscating or guessing), acquiring unauthorized access to the Web server. UDP Hijacking - does not use sequencing for session establishment and sending packets, uses broadcasting messages across the network

6 Defensive Measures Measures can be taken to reduce the risks of attack - The Information Security Technology Security Vulnerability Classification Guide provides a method where users can measure the level of vulnerability to their home internet system. A mathematical formula is provided to measure a score that can impact on the level of attack Education through online courses about internet of things (IoT)

7 Defensive Measures Software packages can help in reducing the risk of attacks Host-based intrusion prevention system (HIPS) - software packages can assist users in the detection of any suspicious activity by analyzing events occurring within that host aims to stop malware by monitoring the behavior of code Network-based intrusion detection system (NIDS) - used to monitor and analyze network traffic to protect your system from network-based threats

8 Conclusion Awareness of threats to the average costumer who use many of the internet-based devices, is important as the potentiality of harm to personal information helps to minimize attacks. Education in attacks is the beginning of defending from attacks but not enough As smart devices become introduced and improved, proactiveness and defensive measures against cybercriminal activity becomes a responsibility for everyone


Download ppt "Home Internet Vulnerabilities"

Similar presentations


Ads by Google