Data security threats in the home of environment

被引:0
|
作者
Proctor, T [1 ]
机构
[1] Wolverhampton Univ, Sch Comp & IT, Wolverhampton, England
来源
Home-Oriented Informatics and Telematics, Proceedings | 2005年 / 178卷
关键词
home security; data integrity; threats;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The aim of this paper is to assess the relevance of data security in the home environment and to identify the nature of vulnerability. At the time of writing most data in the home is stored manually. The widespread use of the Internet, home pc's and mobile devices now means that increasingly individuals (and families) are storing "home information" electronically. It is highly likely to be a trend that continues. Information on specific data security related issues is widely available in terms of "how to protect your pc" and there are also many products that are available to assist with this. The level of actual understanding that home users have of the general data security issues and the means that they take to protect themselves are not well documented. The approach taken in this paper is to look at many of the data security threats posed to existing ICT devices and to put them in the context of systems that are currently used or may be used in future, in the home environment. The paper clearly defines that it is not concerned with the broader topics of data assurance (which would include fire, flood etc). The primary focus is the potential for malicious acts being committed by unauthorised use of the systems. Where are the threats from and what can be done to alleviate them? Are the main vulnerabilities in the connectivity, the systems, or both? Since technology now softens the "environmental" boundaries, this paper alludes to the scope of the home environment. It also discusses existing solutions to perceived threats; whether they appear to be understood and whether they appear to be working. It looks for the evidence to demonstrate the significance of data security in relation to the development of "intelligent homes". The paper then takes into consideration the directions in which technology appears to be developing in arriving at conclusions.
引用
收藏
页码:133 / 144
页数:12
相关论文
共 50 条
  • [21] Analysis of Techniques for Visualizing Security Risks and Threats
    Udeagwu, Chinyelu Philomena
    Sotiriadis, Stelios
    Asimakopoulou, Eleana
    Bessis, Nik
    Trovati, Marcelo
    2015 10TH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2015, : 584 - 590
  • [22] Virtual network security: threats, countermeasures, and challenges
    Bays, Leonardo Richter
    Oliveira, Rodrigo Ruas
    Barcellos, Marinho Pilla
    Gaspary, Luciano Paschoal
    Mauro Madeira, Edmundo Roberto
    JOURNAL OF INTERNET SERVICES AND APPLICATIONS, 2015, 6
  • [23] THREATS TO FOOD SECURITY AND COMMON AGRICULTURAL POLICY
    Kwasek, Mariola
    EKONOMIKA POLJOPRIVREDA-ECONOMICS OF AGRICULTURE, 2012, 59 (04): : 701 - 713
  • [24] A systematic review of security threats and countermeasures in SaaS
    de Leon Guillen, Miguel Angel Diaz
    Morales-Rocha, Victor
    Fernandez Martinez, Luis Felipe
    JOURNAL OF COMPUTER SECURITY, 2020, 28 (06) : 635 - 653
  • [25] Global community security: manifestations, priorities, and threats
    Vyshnevska, O.
    Melnyk, I.
    Sarapina, O.
    Pinchuk, T.
    Yeremian, O.
    UKRAINIAN JOURNAL OF ECOLOGY, 2020, 10 (05): : 259 - 265
  • [26] Internet of Things (IoT): Security and Privacy Threats
    Shaikh, Eman
    Mohiuddin, Iman
    Manzoor, Ayisha
    2019 2ND INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS), 2019,
  • [27] REASEARCH FOR THREATS AND SECURITY IN RFID INFORMATION SYSTEM
    Wang, Zhaoshun
    Chen, Hongsong
    Huang, Xiaoli
    CIICT 2008: PROCEEDINGS OF CHINA-IRELAND INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATIONS TECHNOLOGIES 2008, 2008, : 288 - 291
  • [28] Security threats categories in healthcare information systems
    Samy, Ganthan Narayana
    Ahmad, Rabiah
    Ismail, Zuraini
    HEALTH INFORMATICS JOURNAL, 2010, 16 (03) : 201 - 209
  • [29] THE EVOLUTION OF THREATS TO COMPANY'S FINANCIAL SECURITY
    Trydid, O. M.
    Orekhova, K., V
    Zelenska, M., V
    Fialkovska, I., V
    FINANCIAL AND CREDIT ACTIVITY-PROBLEMS OF THEORY AND PRACTICE, 2015, 1 (18): : 88 - 102
  • [30] Survey on Security Threats of Smartphones in Internet of Things
    Khan, Muhammad Hassam
    Shah, Munam Ali
    2016 22ND INTERNATIONAL CONFERENCE ON AUTOMATION AND COMPUTING (ICAC), 2016, : 561 - 566