Webopedia on Google+Webopedia on TwitterWebopedia on FacebookTech Bytes Blog
Main » Did You Know » Internet »

Are Cable Internet Connections Vulnerable to Hackers?

A PC that is connected to the Internet via a cable modem (i.e., using a cable television ISP) is always vulnerable to a malicious hack attack whenever the PC is on. Even if a browser is not opened, merely turning on a PC with a cable connection renders the device vulnerable to attack.

Why is this? Because cable ISPs, in providing the Internet access to a user, essentially are creating giant always-connected networks of PCs comprised of all their customers. Cable connections utilize Ethernet cards, which render the user one link in a giant network. Even if a browser is never opened, a cable-connected PC links to the Ethernet-enabled network (i.e., the Internet) as soon as the PC is booted -- just as a connection to a LAN or other corporate network renders the device vulnerable to attacks across that network. This gives a hacker access to the user's hard drive, and opens the door for many kinds of malicious hack attacks.

One way to protect a cable-connected PC from malicious hacks is to disable file-sharing and print-sharing capabilities in the operating system. This is a simple solution for some but for others not a reality as this method basically disables any kind of home networking.

A better method is to install either a hardware or software firewall. A hardware firewall typically is a small device that the cable and the Ethernet card are both connected to. All transmissions pass through the hardware firewall. A software firewall, which is the more common and cheaper of the two methods, is a piece of code that resides on your PC and is always running. The software watches interactions between the PC and the Internet and blocks any suspicious activities.







TECH RESOURCES FROM OUR PARTNERS
LATEST ARTICLES
Slideshow: 5 Hot Holiday Gifts for Tech Enthusiasts

From cute electronic toys to VR gaming, here are 5 hot gifts to give to your special tech enthusiast this holiday season. Read More »

What's Hot in Tech: AI Tops the List

Like everything in technology, AI touches on so many other trends, like self-driving cars and automation, and Big Data and the Internet of Things... Read More »

DevOp's Role in Application Security

As organizations rush to release new applications, security appears to be getting short shrift. DevSecOps is a new approach that holds promise. Read More »

STUDY GUIDES
Java Basics, Part 1

Java is a high-level programming language. This guide describes the basics of Java, providing an overview of syntax, variables, data types and... Read More »

Java Basics, Part 2

This second Study Guide describes the basics of Java, providing an overview of operators, modifiers and control Structures. Read More »

The 7 Layers of the OSI Model

The Open System Interconnection (OSI) model defines a networking framework to implement protocols in seven layers. Use this handy guide to compare... Read More »