Data security threats in the home of environment

被引:0
|
作者
Proctor, T [1 ]
机构
[1] Wolverhampton Univ, Sch Comp & IT, Wolverhampton, England
来源
Home-Oriented Informatics and Telematics, Proceedings | 2005年 / 178卷
关键词
home security; data integrity; threats;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The aim of this paper is to assess the relevance of data security in the home environment and to identify the nature of vulnerability. At the time of writing most data in the home is stored manually. The widespread use of the Internet, home pc's and mobile devices now means that increasingly individuals (and families) are storing "home information" electronically. It is highly likely to be a trend that continues. Information on specific data security related issues is widely available in terms of "how to protect your pc" and there are also many products that are available to assist with this. The level of actual understanding that home users have of the general data security issues and the means that they take to protect themselves are not well documented. The approach taken in this paper is to look at many of the data security threats posed to existing ICT devices and to put them in the context of systems that are currently used or may be used in future, in the home environment. The paper clearly defines that it is not concerned with the broader topics of data assurance (which would include fire, flood etc). The primary focus is the potential for malicious acts being committed by unauthorised use of the systems. Where are the threats from and what can be done to alleviate them? Are the main vulnerabilities in the connectivity, the systems, or both? Since technology now softens the "environmental" boundaries, this paper alludes to the scope of the home environment. It also discusses existing solutions to perceived threats; whether they appear to be understood and whether they appear to be working. It looks for the evidence to demonstrate the significance of data security in relation to the development of "intelligent homes". The paper then takes into consideration the directions in which technology appears to be developing in arriving at conclusions.
引用
收藏
页码:133 / 144
页数:12
相关论文
共 50 条
  • [41] Cyber Security Threats and Vulnerabilities: A Systematic Mapping Study
    Mamoona Humayun
    Mahmood Niazi
    NZ Jhanjhi
    Mohammad Alshayeb
    Sajjad Mahmood
    Arabian Journal for Science and Engineering, 2020, 45 : 3171 - 3189
  • [42] Study of the Different Security Threats on the Internet of Things and their Applications
    Sahmi, Imane
    Mazri, Tomader
    Hmina, Nabil
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON NETWORKING, INFORMATION SYSTEMS & SECURITY (NISS19), 2019,
  • [43] COVID-19, Security Threats and Public Opinions
    Bove, Vincenzo
    Di Leo, Riccardo
    PEACE ECONOMICS PEACE SCIENCE AND PUBLIC POLICY, 2020, 26 (03)
  • [44] A Critical Evaluation of Privacy and Security Threats in Federated Learning
    Asad, Muhammad
    Moustafa, Ahmed
    Yu, Chao
    SENSORS, 2020, 20 (24) : 1 - 15
  • [45] MECHANISM FOR NEUTRALIZING INTERNAL AND EXTERNAL THREATS TO THE FINANCIAL SECURITY
    Zhyvko, Z.
    Senyshyn, O.
    Rushchyshyn, N.
    Kukharska, L.
    Drymalovska, Kh.
    FINANCIAL AND CREDIT ACTIVITY-PROBLEMS OF THEORY AND PRACTICE, 2021, 4 (39): : 312 - 319
  • [46] Cyber Security Threats and Vulnerabilities: A Systematic Mapping Study
    Humayun, Mamoona
    Niazi, Mahmood
    Jhanjhi, N. Z.
    Alshayeb, Mohammad
    Mahmood, Sajjad
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2020, 45 (04) : 3171 - 3189
  • [47] A Review of Security Threats, Solutions and Trust Management in VANETs
    Premasudha, B. G.
    Ram, V. Ravi
    Miller, J.
    Suma, R.
    INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2016, 7 (01): : 38 - 57
  • [48] Security of Web Applications: Threats, Vulnerabilities, and Protection Methods
    Mohammed, Asma
    Alkhathami, Jamilah
    Alsuwat, Hatim
    Alsuwat, Emad
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2021, 21 (08): : 167 - 176
  • [49] Prediction of data threats over web medium using advanced blockchain based information security with crypto strategies
    Taloba, Ahmed, I
    Elhadad, Ahmed
    Abd El-Aziz, Rasha M.
    Shahin, Osama R.
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021,
  • [50] Survey on Security Threats in Agricultural IoT and Smart Farming
    Demestichas, Konstantinos
    Peppes, Nikolaos
    Alexakis, Theodoros
    SENSORS, 2020, 20 (22) : 1 - 17