Personal Computer Security Threats in Bengaluru India
Keywords:
Personal Computer, Security Threats, Security Practices, BangaloreAbstract
India’s personal computer (PC) usage is increasing significantly every year and this increase poses a huge opportunity for security threats as many individuals may not have adequate knowledge about good security practices. The paper aims to study the state of PC security threats in Bangalore which is one of the major cities in South-Western India. We used statistical software to process and analyze the questionnaires we collected. The results of the study show that (i) PC users implement good authentic passwords but this does not provide security for their devices, (ii) PC owners do not update their anti-virus software and some PC protection software regularly which can create loopholes for malicious attackers (iii) PC owners use many free subscription accounts and this can be a trigger for privacy threats.
References
1. Abomhara, M., & Køien, G. M. (2015). Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks. Journal of Cyber Security and Mobility, 65-88.
2. Alkhalil, Z., Hewage, C., Nawaf, L., & Khan, I. (2021). Phishing attacks: A recent comprehensive study and a new anatomy. Frontiers in Computer Science, 3, 563060. https://doi.org/10.3389/fcomp.2021.563060.
3. Arachchilage, N. A. G., & Love, S. (2014). Security awareness of computer users: A phishing threat avoidance perspective. Computers in human behavior, 38, 304-312.
4. Arenas, Á., Ray, G., Hidalgo, A., & Urueña, A. (2024). How to keep your information secure? Toward a better understanding of users security behavior. Technological Forecasting and Social Change, 198, 123028.
5. Avizienis, A., Laprie, J. C., Randell, B., & Landwehr, C. (2004). Basic concepts and taxonomy of dependable and secure computing. IEEE transactions on dependable and secure computing, 1(1), 11-33. https://doi.org/10.1109/TDSC.2004.2.
7. Bansal, C., Bhargavan, K., Delignat-Lavaud, A., & Maffeis, S. (2014). Discovering concrete attacks on website authorization by formal analysis. Journal of Computer Security, 22(4), 601-657.
8. Calderaro, A., & Craig, A. J. (2020). Transnational governance of cybersecurity: policy challenges and global inequalities in cyber capacity building. Third world quarterly, 41(6), 917-938.
9. Carrozza, G., Pietrantuono, R., & Russo, S. (2018). A software quality framework for large-scale mission-critical systems engineering. Information and Software Technology, 102, 100-116. https://doi.org/10.1016/j.infsof.2018.05.009.
10. Chander, S., & Kush, A. (2012). Vulnerabilities in web pages and web sites. International Journal of Advanced Research in IT and Engineering, 1(2), 47-57.
11. Chang, L. Y., & Coppel, N. (2020). Building cyber security awareness in a developing country: lessons from Myanmar. Computers & Security, 97, 101959.
12. Chang, V., Kuo, Y. H., & Ramachandran, M. (2016). Cloud computing adoption framework: A security framework for business clouds. Future Generation Computer Systems, 57, 24-41.
13. Chawla, D., & Joshi, H. (2019). Consumer attitude and intention to adopt mobile wallet in India–An empirical study. International Journal of Bank Marketing, 37(7), 1590-1618.
14. Chudasama, D. M., Sharma, L. K., Sonlanki, N. C., & Sharma, P. (2019). Refine framework of information systems audits in Indian context. International Journal of Computer Sciences and Engineering, 7(5), 331-345.
15. Colwill, C. (2009). Human factors in information security: The insider threat–Who can you trust these days?. Information security technical report, 14(4), 186-196. https://doi.org/10.1016/j.istr.2010.04.004.
16. Dhillon, G., Syed, R., & de Sá-Soares, F. (2017). Information security concerns in IT outsourcing: Identifying (in) congruence between clients and vendors. Information & Management, 54(4), 452-464. https://doi.org/10.1016/j.im.2016.10.002.
17. Frank, I., & Odunayo, E. (2013). Approach to cyber security issues in Nigeria: challenges and solution. International Journal of Cognitive Research in science, engineering and education, 1(1), 100-110.
18. Hamidi, M. S., & Singh, B. (2024). Analysis of Cyber Security Challenges in Developing Countries. Nanotechnology Perceptions, 604-610.
19. Haseloff, A. M. (2005). Cybercafés and their potential as community development tools in India. The journal of community informatics, 1(3).
20. Jain, M., Sinha, A., Agrawal, A., & Yadav, N. (2022, November). Cyber security: Current threats, challenges, and prevention methods. In 2022 International Conference on Advances in Computing, Communication and Materials (ICACCM) (pp. 1-9). IEEE.
21. Jaishankar, K. (Ed.). (2011). Cyber criminology: exploring internet crimes and criminal behavior. CRC Press.
22. Kang, R., Dabbish, L., Fruchter, N., & Kiesler, S. (2015). {“My} data just goes {Everywhere:”} user mental models of the internet and implications for privacy and security. In Eleventh symposium on usable privacy and security (SOUPS 2015) (pp. 39-52).
23. Kshetri, N. (2016). Cybercrime and cybersecurity in India: causes, consequences and implications for the future. Crime, Law and Social Change, 66, 313-338.
24. Kumar, N. K. (2016). Legal Status of Virtual Business in India: Issues and Challenges. vol, 3, 243-263.
25. Landwehr, C. E. (2001). Computer security. International journal of information security, 1(1), 3-13. https://doi.org/10.1007/s102070100003.
26. Landwehr, C. E., Bull, A. R., McDermott, J. P., & Choi, W. S. (1994). A taxonomy of computer program security flaws. ACM Computing Surveys (CSUR), 26(3), 211-254.
27. Lévesque, F. L., Chiasson, S., Somayaji, A., & Fernandez, J. M. (2018). Technological and human factors of malware attacks: A computer security clinical trial approach. ACM Transactions on Privacy and Security (TOPS), 21(4), 1-30.
28. Li, Z., He, W., Akhawe, D., & Song, D. (2014). The {Emperor’s} new password manager: Security analysis of web-based password managers. In 23rd USENIX Security Symposium (USENIX Security 14) (pp. 465-479).
29. Martin, N., & Rice, J. (2011). Cybercrime: Understanding and addressing the concerns of stakeholders. Computers & Security, 30(8), 803-814.
30. Mishra, A., Alzoubi, Y. I., Gill, A. Q., & Anwar, M. J. (2022). Cybersecurity enterprises policies: A comparative study. Sensors, 22(2), 538.
31. Patil, B. P., Kharade, K. G., & Kamat, R. K. (2020). Investigation on data security threats & solutions. International Journal of Innovative Science and Research Technology, 5(1), 79-83.
32. Proctor, R. W., Lien, M. C., Vu, K. P. L., Schultz, E. E., & Salvendy, G. (2002). Improving computer security for authentication of users: Influence of proactive password restrictions. Behavior Research Methods, Instruments, & Computers, 34, 163-169.
33. Rader, E., & Wash, R. (2015). Identifying patterns in informal sources of security information. Journal of Cybersecurity, 1(1), 121-144.
34. Rangaswamy, N., & Nair, S. (2012). The PC in an Indian urban slum: enterprise and entrepreneurship in ICT4D 2.0. Information technology for Development, 18(2), 163-180.
35. Reece, R. P., & Stahl, B. C. (2015). The professionalisation of information security: Perspectives of UK practitioners. Computers & Security, 48, 182-195.
36. Renaud, K., Otondo, R., & Warkentin, M. (2019). “This is the way ‘I’create my passwords”... does the endowment effect deter people from changing the way they create their passwords?. Computers & Security, 82, 241-260.
37. Sarkar, K. R. (2010). Assessing insider threats to information security using technical, behavioural and organisational measures. information security technical report, 15(3), 112-133.
38. Schia, N. N. (2018). The cyber frontier and digital pitfalls in the Global South. Third World Quarterly, 39(5), 821-837.
39. Shah, P., & Agarwal, A. (2020). Cybersecurity behaviour of smartphone users in India: an empirical analysis. Information & Computer Security, 28(2), 293-318.
40. Singh, A. N., Picot, A., Kranz, J., Gupta, M. P., & Ojha, A. (2013). Information security management (ism) practices: Lessons from select cases from India and Germany. Global Journal of Flexible Systems Management, 14, 225-239.
41. Smahel, D., Dedkova, L., Kraus, L., Matyas, V., & Stavova, V. (2022). Investigating Installers of Security Software in 20 Countries: Individual‐and Country‐Level Differences. Human Behavior and Emerging Technologies, 2022(1), 1230344.
42. Tabrizchi, H., & Kuchaki Rafsanjani, M. (2020). A survey on security challenges in cloud computing: issues, threats, and solutions. The journal of supercomputing, 76(12), 9493-9532.
43. Tanjin, M., Botlero, I. A., Hridita, M. T., Riyadh, T. I., Onik, M. M. H., & Miraz, M. H. (2021). Privacy and security factors of government websites versus private websites in Bangladesh and USA: a comparative study. In Emerging Technologies in Computing: 4th EAI/IAER International Conference, iCETiC 2021, Virtual Event, August 18–19, 2021, Proceedings 4 (pp. 37-55). Springer International Publishing.
44. Wash, R. (2010, July). Folk models of home computer security. In Proceedings of the Sixth Symposium on Usable Privacy and Security (pp. 1-16).
45. Yee, G. O. (2020, November). Towards Reducing the Impact of Data Breaches. In Proc. Fourteenth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2020) (pp. 75-81).

