Every time a home PC or small home/office network goes online, it connects to thousands of unknown networks and millions of their users. Connecting to Internet provides the opportunities to communicate and share information with others. But it also gives opportunities to Internet users that are involved in malicious activities. It’s often believed by many that they don't possess anything that would be of any interest to intruders. But in most of the computer attacks, these computers are used as launching pads to spread viruses, worms and other attacks. They just serve as one link in a chain of multiple compromised systems. Hackers have been around since the dawn of the Internet. Some hackers are benign, they actually work for computer security companies to find holes in software and provide better ways to protect computers and their owners. On the other side of this are the hackers who have malicious intents, to steal our hard works, our personal and credit information for their own gain. Hackers are generally a smart crowd, and if we put enough obstacles in their way, they will move on to an easier target. There is some of the information a home user might not consider significant, but would be useful to an attacker: Every IP-enabled device — a camera, a smart phone, a tablet, and others. — is a doorway into your network. Default passwords and IP addresses that are known to hackers worldwide. As a result, it can be easy for a hacker to guess these settings and access a WLAN via unsecured devices.
Please join StudyMode to read the full document