Are Cable Internet Connections Vulnerable To Hackers?

A PC that is connected to the Internet via a cable modem is always vulnerable to a malicious hack attack whenever the PC is on.

A PC that is connected to the Internet via a cable modem (i.e., using a cable television ISP) is always vulnerable to a malicious hack attack whenever the PC is on. Even if a browser is not opened, merely turning on a PC with a cable connection renders the device vulnerable to attack.

Why is this? Because cable ISPs, in providing the Internet access to a user, essentially are creating giant always-connected networks of PCs comprised of all their customers. Cable connections utilize Ethernet cards, which render the user one link in a giant network. Even if a browser is never opened, a cable-connected PC links to the Ethernet-enabled network (i.e., the Internet) as soon as the PC is booted — just as a connection to a LAN or other corporate network renders the device vulnerable to attacks across that network. This gives a hacker access to the user’s hard drive, and opens the door for many kinds of malicious hack attacks.

One way to protect a cable-connected PC from malicious hacks is to disable file-sharing and print-sharing capabilities in the operating system. This is a simple solution for some but for others not a reality as this method basically disables any kind of home networking.

A better method is to install either a hardware or software firewall. A hardware firewall typically is a small device that the cable and the Ethernet card are both connected to. All transmissions pass through the hardware firewall. A software firewall, which is the more common and cheaper of the two methods, is a piece of code that resides on your PC and is always running. The software watches interactions between the PC and the Internet and blocks any suspicious activities.

This article was originally published on August 28, 2003

Webopedia Staff
Webopedia Staff
Since 1995, more than 100 tech experts and researchers have kept Webopedia’s definitions, articles, and study guides up to date. For more information on current editorial staff, please visit our About page.

Related Articles

Best Managed Security Service Providers (MSSPs)

Organizations of all sizes can outsource their management of security devices and systems to a Managed Security Service Provider (MSSP). For most companies, it...

Remote Desktop Software

Remote desktop software gives businesses tools to use their company computers and resources from geographically distributed locations. The flexibility to log into a remote...

Gartner

Gartner is a world-renowned information technology (IT) consultancy and advisory firm that conducts research on different technologies and provides insights to clients for smarter...

Web Server

Web servers are computers that deliver, or serve, web pages to internet end users. Web servers require both hardware and software to work. Every...

Best Managed Security Service...

Organizations of all sizes can outsource their management of security devices and systems...

Gartner

Gartner is a world-renowned information technology (IT) consultancy and advisory firm that conducts...

Coursera

Coursera is an online education platform that offers a variety of courses and...