Can you answer these questions about cyber security?

10 pts.
Cyber security
vulnerability management
I think some low-life is paying some other low-life some money to target my computer so I want to keep it secure. Can you tell me if the following is correct? The basic concept of hacking a computer over the Internet involves scanning the target's computer for open ports, then searching for applications/programs using those open ports which have vulnerabilities and then exploiting those vulnerabilities to hack into the target's computer. When I say this I mean doing this without being able to trick the target over email or something similar. If this is correct then is it ok to assume that if: A) I have done a fresh installation of my OS(Ubuntu), updated it and then connect to the Internet with firewall set to allow only outgoing connections and only system application running, my computer cannot get hacked?(Assuming the updated system has all its known vulnerablities fixed. Does this happen?) B) Same as before except with no firewall running. 2) Can I use virtual box to connect to the Internet and keep the base OS safe? Like Qubes? If my virtual box gets hacked will it stay confined to the virtual machine? Some people say being 100% safe is not possible, so how good do you think the security is? What are the chances of someone getting into the host machine? What could I do to keep the hacker from accessing the host machine? Maybe setting up the firewall in a specific way? 3) Are text based applications more secure than GUI applications? Is there any application that has not had any vulnerabilities found for many years?

Answer Wiki

Thanks. We'll let you know when a new response is added.

A lot of questions. It seems like you are on the right track to securing your system. It all comes down to this,you can take all the steps possible to prevent your system form being hacked, and still get hacked. Firewalls, antivirus are good front line defenses. Then there is the issue of opening infected emails, click bait links on shady websites, posting personal info on social media that may be used to hack your passwords and even key loggers. If a hacker wants into your system, given enough time, he will find a way in if his skills are good enough. The only way to be almost 100% hack proof is never connect to the internet or another network. Doing that means no updates to software and eliminates a lot of apps and programs that require account setups, Today’s hackers are getting in using exploits in the OS itself as well as things like commonly used plugins like Flash and other. They find a flaw and use that as the base for their hack. A lot of the hacks today can be prevented with a little more education and awareness of the risks. So many sites as well as other things can be spoofed, tricking users and opening themselves to a hack.

Discuss This Question: 2  Replies

There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when members answer or reply to this question.
  • TheRealRaven
    I have three routers at home.

    The first is commercial, supplied by my ISP. It is compromised every once in a while and needs to be reset. It gets configured to restrict incoming connections, but not much more is done since I really don't want to mess much with it and lose most ISP support.

    Next in line is a different type of router. Also just a basic (inexpensive) home router from a different manufacturer. That reduces risk of vulnerabilities being the same on those first two network points. If the first is compromised, work is needed simply to determine what the next hop physically is, much less figure out how to control it. Three or four times the first has been taken over with floods of probes being sent farther in. I usually watch for few minutes before taking it down and resetting.

    Other than router #2, there's only a Linux laptop connected to router #1. Neither the laptop nor router #2 has been taken over in the past decade of this setup.

    Router #2 is for my normal home network. Inbound connections are also blocked there. Since there's been no evidence of any intrusion that far, I'm not particularly concerned about using my home network.

    However, I still have router #3. I run three fairly large servers and some network storage at home, and these have programming and data that I want protected. In the unlikely chance that router #2 is ever breached, I want still another obstacle. Again, router #3 is a basic home router from a different manufacturer of the other two.

    Firmware on all three is updated once in a while to reduce complacency. I don't have a static IP at home, so it's unlikely that anyone will track it for return engagements over time, even if there's a hint that there's anything worth the effort. Mostly all that's seen is some normal Internet activity going out of router #1 plus a fairly unresponsive (Linux) device.

    Overall, basic configuration of the ISP's router combined with a second (cheap) router inside has been fully sufficient for going on 20 years. With no static IP, there's no reason to think this is anything but someone's home; so it's automatically not a 'high value' target.

    Home routers are cheap. Adding a second one inside is almost as simple (and cheap) as it gets for protection from intrusions. Having two separate blocks on inbound connections makes a home network practically "safe".
    33,210 pointsBadges:
  • ToddN2000
    Nice write up Raven..We can never be to safe today.. I to have had issues in the past with my ISP provided routers.. As far as I know I have only had one intrusion many years ago. That was fixed almost immediately. So I may tend to be a bit more cautions that the average users who uses only what is provide to them hardware and software wise. If you lose your data, pictures or any thing important, we can only blame ourselves for not using firewalls, anti virus programs and doing backups on a regular basis.  I feel for some of these people but the masses have been warned over and over. 
    128,395 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.


Share this item with your network: