Identifying Threats and Vulnerabilities in Home Internet Connection