What if I make my machine stuck with a physical hardware switch when someone attacks my computer ? Can it be a good feature as all access is based on NIC card and what if I disable it when a hacker tries to hack my computer ?
No, I don't think a hardware switch would work. First, how would you know whether someone was attacking your computer? Even if you did, could you react fast enough to stop them? Second, not all attacks come through a NIC card - lots of people use wireless and you could also get attacked through there or from an infected USB memory stick. If you fell for a phish, you would not be able to stop that with a physical switch. So no, a hardware switch wouldn't be particularly effective.
Sir Jeff Sedayao I am trying to tell that when an attack is going to be there then there incoming speed is very fast. So, why don't we attach a centralised hardware switch. An analog switch which no one can handle. The switch will be automatically turned on when there is a attack. Blocking all the connections of computer at the same corresponding time. As our computer has BIOS which can disable all the I/Os. Same will be happening with the hardware switch, only there is no way of GUI for it because GUI can be the number 1 source of a hacker to easily get in. What I am trying to tell is a very big problem can be solved with a very simple solution.
I see a number of problems with this approach. First, it is impossible to know with certainty when an attack is happening. If even you could sense all known attacks, you can be vulnerable to the unknown ones, which is why there is a market for zero day attacks.
Second, if you cut off the connectivity of a computer when it is attacked, one attack that you have just enabled is a very lightweight DOS attack. You could shut down a computer and render it useless simply by hitting it with a well known attack. This will work with the centralized switch approach because the switch would cut off the computer's connectivity, which makes it hard to do anything useful with the computer.
Third, there are cases when you don't want to cut off attackers access after you have discovered them. You might want to get intelligence on what they are doing, their methods, and what they are looking for.