Data security threats in the home of environment

被引:0
|
作者
Proctor, T [1 ]
机构
[1] Wolverhampton Univ, Sch Comp & IT, Wolverhampton, England
来源
Home-Oriented Informatics and Telematics, Proceedings | 2005年 / 178卷
关键词
home security; data integrity; threats;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The aim of this paper is to assess the relevance of data security in the home environment and to identify the nature of vulnerability. At the time of writing most data in the home is stored manually. The widespread use of the Internet, home pc's and mobile devices now means that increasingly individuals (and families) are storing "home information" electronically. It is highly likely to be a trend that continues. Information on specific data security related issues is widely available in terms of "how to protect your pc" and there are also many products that are available to assist with this. The level of actual understanding that home users have of the general data security issues and the means that they take to protect themselves are not well documented. The approach taken in this paper is to look at many of the data security threats posed to existing ICT devices and to put them in the context of systems that are currently used or may be used in future, in the home environment. The paper clearly defines that it is not concerned with the broader topics of data assurance (which would include fire, flood etc). The primary focus is the potential for malicious acts being committed by unauthorised use of the systems. Where are the threats from and what can be done to alleviate them? Are the main vulnerabilities in the connectivity, the systems, or both? Since technology now softens the "environmental" boundaries, this paper alludes to the scope of the home environment. It also discusses existing solutions to perceived threats; whether they appear to be understood and whether they appear to be working. It looks for the evidence to demonstrate the significance of data security in relation to the development of "intelligent homes". The paper then takes into consideration the directions in which technology appears to be developing in arriving at conclusions.
引用
收藏
页码:133 / 144
页数:12
相关论文
共 50 条
  • [31] A Critical Review of Security Threats in Cloud Computing
    Irfan, Mahroosh
    Usman, Muhammad
    Zhuang, Yan
    Fong, Simon
    2015 3RD INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL AND BUSINESS INTELLIGENCE (ISCBI 2015), 2015, : 105 - 111
  • [32] Issues with Various Security Threats on Mobile Phones
    Nseir, Sana
    Hirzallah, Nael
    Aqel, Musbah
    PROCEEDINGS OF THE 2013 PALESTINIAN INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (PICICT), 2013, : 37 - 42
  • [33] Threats to the Economic Security of the Agricultural Sector of the Republic of Mordovia
    Vorobyova, E. G.
    Kildyushkina, I. G.
    REGIONOLOGIYA-REGIONOLOGY RUSSIAN JOURNAL OF REGIONAL STUDIES, 2019, 27 (02): : 246 - 269
  • [34] RESEARCH OF SECURITY THREATS IN THE USE OF MODERN TERMINAL DEVICES
    Perakovic, Dragan
    Husnjak, Sinisa
    Remenar, Vladimir
    ANNALS OF DAAAM FOR 2012 & PROCEEDINGS OF THE 23RD INTERNATIONAL DAAAM SYMPOSIUM - INTELLIGENT MANUFACTURING AND AUTOMATION - FOCUS ON SUSTAINABILITY, 2012, 23 : 545 - 548
  • [35] Security Threats and Challenges to IoT and its Applications: A Review
    Anwar, Raja Waseem
    Zainal, Anazida
    Abdullah, Tariq
    Iqbal, Saleem
    2020 FIFTH INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING (FMEC), 2020, : 301 - 305
  • [36] National Security Strategies in response to transnational risk and threats
    Martinez, Rafa
    REFLEXION POLITICA, 2018, 20 (40): : 10 - 20
  • [37] EVOLUTION OF BALTIC SECURITY: ANALYSIS OF THREATS AND STRATEGIC RESPONSES
    Cobos, Ricardo Rodriguez
    REVISTA UNISCI, 2024, (66): : 205 - 235
  • [38] Evaluation of Threats to The Internal Safety and Internal Security of The State
    Bil, Jacek
    EDUCATION EXCELLENCE AND INNOVATION MANAGEMENT: A 2025 VISION TO SUSTAIN ECONOMIC DEVELOPMENT DURING GLOBAL CHALLENGES, 2020, : 14757 - 14761
  • [39] E-business, recent threats and security countermeasures
    Pournouri, Sina
    Craven, Matthew
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2014, 6 (03) : 169 - 184
  • [40] The Threats of Returning Foreign Terrorist Fighters for the European Security
    Babanoski, Kire
    JOURNAL OF APPLIED SECURITY RESEARCH, 2020, 15 (01) : 10 - 27