Quick Reference: Cyber Attacks Awareness and Prevention Method for Home Users

It is important to take security measures to protect
your computer information, reduce identify theft, and prevent from
malicious cyber-attacks. With cyber-attacks on the continuous rise,
people need to understand and learn ways to prevent from these
attacks. Cyber-attack is an important factor to be considered if one is
to be able to protect oneself from malicious attacks. Without proper
security measures, most computer technology would hinder home
users more than such technologies would help. Knowledge of how
cyber-attacks operate and protective steps that can be taken to reduce
chances of its occurrence are key to increasing these security
measures. The purpose of this paper is to inform home users on the
importance of identifying and taking preventive steps to avoid cyberattacks.
Throughout this paper, many aspects of cyber-attacks will be
discuss: what a cyber-attack is, the affects of cyber-attack for home
users, different types of cyber-attacks, methodology to prevent such
attacks; home users can take to fortify security of their computer.





References:
[1] CSID. (2012, September). CONSUMER SURVEY:. Retrieved from
CSID:http://www.csid.com/wpcontent/
uploads/2012/09/CS_PasswordSurvey_FullReport_FINAL.pdf
[2] (2014). Cisco 2014 annual security report. Retrieved from
http://www.cisco.com/web/offer/gist_ty2_asset/Cisco_2014_ASR.pdf
[3] Indiana University. (2014, November 12). What are phishing scams and
how can I avoid them? Retrieved from Indiana University Knowledge
Base: https://kb.iu.edu/d/arsf
[4] Musil, S. (2013, August 21). Cybercrooks use DDoS attacks to mask
theft of banks' millions. Retrieved from CNET:
http://www.cnet.com/news/cybercrooks-use-ddos-attacks-to-mask-theftof-
banks-millions/
[5] Pennsylvannia State University. (2013, March 14). Types of Attacks.
Retrieved from Pennsylvannia State University Personal Web Servers:
http://www.personal.psu.edu/users/j/m/jms6423/Engproj/Types%20of%
20Attacks.xhtml
[6] Schwarz, C. D. (2014, December 26). 5 ways to prevent a personal cyber
attack. Retrieved from http://hereandnow.wbur.org/2014/12/26/cybersecurity-
sony
[7] Selinger, M. (2013, 12 04). Adobe & java make windows insecure.
Retrieved from http://www.av-test.org/en/news/news-singleview/
adobe-java-make-windows-insecure/
[8] Stone, D. (2015). Detecting Cyber Attacks. Retrieved from Everyday
Life - Global Post: http://everydaylife.globalpost.com/detecting-cyberattacks-
30915.html
[9] U.S. Department of Homeland Security, Federal Emergency
Management Agency. (2013). Cyber attack. Retrieved from website:
http://m.fema.gov/cyber-attack