Data security threats in the home of environment

被引:0
|
作者
Proctor, T [1 ]
机构
[1] Wolverhampton Univ, Sch Comp & IT, Wolverhampton, England
来源
Home-Oriented Informatics and Telematics, Proceedings | 2005年 / 178卷
关键词
home security; data integrity; threats;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The aim of this paper is to assess the relevance of data security in the home environment and to identify the nature of vulnerability. At the time of writing most data in the home is stored manually. The widespread use of the Internet, home pc's and mobile devices now means that increasingly individuals (and families) are storing "home information" electronically. It is highly likely to be a trend that continues. Information on specific data security related issues is widely available in terms of "how to protect your pc" and there are also many products that are available to assist with this. The level of actual understanding that home users have of the general data security issues and the means that they take to protect themselves are not well documented. The approach taken in this paper is to look at many of the data security threats posed to existing ICT devices and to put them in the context of systems that are currently used or may be used in future, in the home environment. The paper clearly defines that it is not concerned with the broader topics of data assurance (which would include fire, flood etc). The primary focus is the potential for malicious acts being committed by unauthorised use of the systems. Where are the threats from and what can be done to alleviate them? Are the main vulnerabilities in the connectivity, the systems, or both? Since technology now softens the "environmental" boundaries, this paper alludes to the scope of the home environment. It also discusses existing solutions to perceived threats; whether they appear to be understood and whether they appear to be working. It looks for the evidence to demonstrate the significance of data security in relation to the development of "intelligent homes". The paper then takes into consideration the directions in which technology appears to be developing in arriving at conclusions.
引用
收藏
页码:133 / 144
页数:12
相关论文
共 50 条
  • [1] Approaching IT Security & Avoiding Threats in the Smart Home Context
    Nehme, Alaa
    George, Joey F. F.
    JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 2022, 39 (04) : 1184 - 1214
  • [2] Information Security Threats and Working from Home Culture: Taxonomy, Risk Assessment and Solutions
    Kotak, Jaidip
    Habler, Edan
    Brodt, Oleg
    Shabtai, Asaf
    Elovici, Yuval
    SENSORS, 2023, 23 (08)
  • [3] Home security system in a web-based networking environment
    Chang, Kyung-Bae
    Kim, Jae-Woo
    Shim, Il-Joo
    Park, Gwi-Tae
    ADVANCES IN COMPUTATIONAL METHODS IN SCIENCES AND ENGINEERING 2005, VOLS 4 A & 4 B, 2005, 4A-4B : 1613 - 1616
  • [4] An Investigation on Cyber Security Threats and Security Models
    Thakur, Kutub
    Qiu, Meikang
    Gai, Keke
    Ali, Md Liakat
    2015 IEEE 2ND INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD), 2015, : 307 - 311
  • [5] SECURITY THREATS AND ATTACKS IN CLOUD
    Mohammed, Asma
    Al Khathami, Jamilah
    Alhakami, Wajdi
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2021, 21 (01): : 184 - 191
  • [6] Problem of Network Security Threats
    Mendyk-Krajewska, Teresa
    Mazur, Zygmunt
    3RD INTERNATIONAL CONFERENCE ON HUMAN SYSTEM INTERACTION, 2010, : 436 - 443
  • [7] IoT Network Security: Threats, Risks, and a Data-Driven Defense Framework
    Wheelus, Charles
    Zhu, Xingquan
    IOT, 2020, 1 (02): : 259 - 285
  • [8] Threats to Health Information Security
    Samy, Ganthan Narayana
    Ahmad, Rabiah
    Ismail, Zuraini
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 540 - 543
  • [9] Mitigating Security Threats in Virtualized Environments
    Yauri, Bashir Aliyu
    Abah, Joshua
    International Journal of Computer Science and Network Security, 2016, 16 (01): : 101 - 108
  • [10] Mobile Payment Security, Threats, and Challenges
    Wang, Yong
    Hahn, Christen
    Sutrave, Kruttika
    PROCEEDINGS OF THE 2016 SECOND CONFERENCE ON MOBILE AND SECURE SERVICES (MOBISECSERV), 2016,