Your IP: Unknown · Your Status: ProtectedUnprotectedUnknown

Skip to main content

Shared resources

Shared resources

(also network resources)

Shared resources definition

Shared resources refer to computing resources that multiple users, applications, or systems share, such as hardware, software, and data. They eliminate the need for users to maintain separate resources while also cutting their costs. Shared resources thereby increase efficiency. However, shared resources imply security risks because cyberattacks can quickly spread to all users or apps within the same environment.

See also: DNS query, tunneling

Shared resources examples

  • Hardware resources: servers, storage devices, and networking equipment.
  • Software resources: software applications and tools.
  • Data resources: data sets and databases.
  • Cloud resources: infrastructure, platforms, and applications.

Common shared resources hacking

  • Man-in-the-middle attack. As data travels through the network from one to another party without proper security measures, hackers may use this opportunity to intercept it and steal sensitive information, such as login credentials, that will enable unauthorized access to users’ data.
  • Distributed denial-of-service attack. With DDoS attacks, hackers overwhelm the network and endanger communication between two parties.
  • DNS tunneling. This method allows cybercriminals to input malware into the DNS queries, gain unauthorized access and cause data breaches to the whole system.

Preventing shared resources hacking

  • Install reputable antivirus software that monitors shared resources and alerts you to suspicious activity.
  • Use unique and strong passwords consisting of letters, numbers, and signs, making it harder for attackers to guess them.
  • Regularly update your operating system and browser because the latest updates come with advanced security features that increase the protection of your data.
  • Utilize encryption to limit data access only to those with unique encryption keys.

Further reading

Ultimate digital security