Security for Small Home Networks
From Computing and Software Wiki
(4 intermediate revisions not shown) | |||
Line 1: | Line 1: | ||
''' Security for Small Home Networks ''' is a procedure to detect and obviate any attempt of unauthorized access to the computer. | ''' Security for Small Home Networks ''' is a procedure to detect and obviate any attempt of unauthorized access to the computer. | ||
- | [[Image:Securityforsmallhome.jpg|500px|right| Security For Small Home]] | + | [[Image:Securityforsmallhome.jpg|500px|right|frame| <div align="center">Security For Small Home</div>]] |
Home wireless network is rarely secured, and therefore it is one of the most popular targets for intruders due to the fact that they can utilize it as a remote server for their applications in many inventive ways for their own purposes. | Home wireless network is rarely secured, and therefore it is one of the most popular targets for intruders due to the fact that they can utilize it as a remote server for their applications in many inventive ways for their own purposes. | ||
Line 7: | Line 7: | ||
- | ===Danger of | + | ===Danger of Unsecure Small Home Network=== |
- | Having unsecure home network is simply providing the intruder the chance to become a part of your local network, which | + | Having unsecure home network is simply providing the intruder the chance to become a part of your local network, which may result in the usage of your broadband connection to get online without paying. However, the problems arise when an unauthorized user could abuse your connection for malicious purposes like hacking or any illegal act and since the intruder is connected to the your network, if the criminal activity is discovered and investigated, the origin of the attack will be traced back to your broadband account. More importantly, the intruder can completely take advantage of an unsecured wireless network by snooping around and steal confidential data and information from your machine or even destroying the information on it. The information damaged could be an application or the operating system resulting in a partial or complete breakdown of the machine. |
- | == Small Home | + | == Small Home Network Threats == |
- | [[Image:Network_threats.jpg|350px|right|Network Threats]] | + | [[Image:Network_threats.jpg|350px|right| Network Threats]] |
===Worms=== | ===Worms=== | ||
Line 20: | Line 20: | ||
===Virus=== | ===Virus=== | ||
- | Is a piece of code that is written by deceitful programmer which copies itself and spread throughout your computer causing great harm to the computer | + | Is a piece of code that is written by deceitful programmer which copies itself and spread throughout your computer causing great harm to many of the computer programs. Unlike worms, viruses need to be executed to replicate, therefore most viruses are attached to executable files, and when the user get to run that executable the virus has the chance to reproduce. Sometimes the programs that got infected act as a virus themselves. |
===Spyware=== | ===Spyware=== | ||
- | They aren’t designed to damage your computer, spyware is a software that may run in the background and collects data about the user and monitor your internet surfing which may lead to identity theft.A spyware program is rarely alone on a computer, an affected machine usually has multiple infections. Users frequently notice some symptoms like | + | They aren’t designed to damage your computer, spyware is a software that may run in the background and collects data about the user and monitor your internet surfing which may lead to identity theft. A spyware program is rarely alone on a computer, an affected machine usually has multiple infections. Users frequently notice some symptoms like slow of system performance, computer starts to behave strangely and in some cases users' computer setting might change and they wont be able to change it back. A common way to become a victim of spyware is to download certain peer-to-peer file swapping products. |
===Trojan Horse program=== | ===Trojan Horse program=== | ||
- | It is one of the most serious threats to computer security simply because it is a software program | + | It is one of the most serious threats to computer security simply because it is a software program that appears to be harmless or useful, but in fact it is very harmful software that gets unauthorized control over your computer. Usually, Trojans create a "backdoor", which is used to send your personal information to another location which may lead to identity theft or sends your credit card numbers and passwords to a stranger. The most common means of infection is through email attachments. |
- | ===Denial of | + | ===Denial of Service=== |
- | Attack that attempt to prevent authorized access to a system resource or delay system operations and functions, it essentially | + | Attack that attempt to prevent authorized access to a system resource or delay system operations and functions, it essentially disables your computer or your network. Despite the fact that a DoS attack does not usually result in the theft of information or other security loss, it can cost the person or company a lot of money and time. Failure to access any web site and dramatic increase in the amount of spam you receive in your account would indicate DoS attack. |
== Ways to Secure Small Home Network == | == Ways to Secure Small Home Network == | ||
- | [[Image:Waystosecuresmallhomenetwork.jpg| | + | [[Image:Waystosecuresmallhomenetwork.jpg|500px|right|frame| <div align="center">Ways to Secure Small Home Network</div>]] |
===Network Firewall=== | ===Network Firewall=== | ||
- | =====a.Change the | + | =====a.Change the Default SSID===== |
- | Devices come with a default system ID called the SSID (Service Set Identifier). | + | Devices come with a default system ID called the SSID (Service Set Identifier). Change the default SSID immediately when configuring wireless security on your network. Because if intruders found a default SSID, they figure that it is a poorly configured network and are much more likely to attack it. Use something unique, not something that can easily be guessed. |
- | =====b.Change | + | =====b.Change Administrator Password===== |
Change the administrative password on your home wireless router when installing the unit so wireless snoopers can’t get into the router and mess around with its settings. The default passwords for popular models of wireless network are well-known to all intruders. | Change the administrative password on your home wireless router when installing the unit so wireless snoopers can’t get into the router and mess around with its settings. The default passwords for popular models of wireless network are well-known to all intruders. | ||
- | ===Enable | + | ===Enable Encryption=== |
WPA(Short for Wi-Fi Protected Access) is a secure method of encrypting information sent over wireless networks. To enable WPA, generate WPA encryption key, copy and paste it into your wireless router's configuration panel. This would help securing your wireless network from traffic getting snooped or your bandwidth getting hijacked. | WPA(Short for Wi-Fi Protected Access) is a secure method of encrypting information sent over wireless networks. To enable WPA, generate WPA encryption key, copy and paste it into your wireless router's configuration panel. This would help securing your wireless network from traffic getting snooped or your bandwidth getting hijacked. | ||
- | ===Web | + | ===Web Filter=== |
- | Web filters are essential for network security that prevents access to unauthorized or malicious web sites. Web filters monitor Web pages and control access to certain websites to determine whether it should be displayed to the user or not. Web filters checks the origin and the content of a Web page against a set of rules provided by company or person who has installed the Web filter.Web filters protect you from malware and many other network threats. Example of such web filter that you can download for free is K9. | + | Web filters are essential for network security that prevents access to unauthorized or malicious web sites. Web filters monitor Web pages and control access to certain websites to determine whether it should be displayed to the user or not. Web filters checks the origin and the content of a Web page against a set of rules provided by company or person who has installed the Web filter. Web filters protect you from malware and many other network threats. Example of such web filter that you can download for free is K9. |
- | ===Spam | + | ===Spam Filter=== |
Just like a web filter, a spam filter looks at your e-mail and sorts it in order to identify and pull out spam mail. Users can install Spam filters either as separate programs, or as part of their e-mail program. Moreover, they can set the spam filter to compare parameters in the incoming mail to their desired lists. For example, a spam filter can be set to check the subject heading or the sender field. Spam filter will protect you from threats like worms and viruses. Example of Spam filter that can be installed is spamAware. | Just like a web filter, a spam filter looks at your e-mail and sorts it in order to identify and pull out spam mail. Users can install Spam filters either as separate programs, or as part of their e-mail program. Moreover, they can set the spam filter to compare parameters in the incoming mail to their desired lists. For example, a spam filter can be set to check the subject heading or the sender field. Spam filter will protect you from threats like worms and viruses. Example of Spam filter that can be installed is spamAware. | ||
Line 62: | Line 62: | ||
=== Install Password Management Software=== | === Install Password Management Software=== | ||
- | Many people use the same password for most of their web applications so they wont have to remember numerous passwords for different applications. However that makes it very easy for an intruder or a hacker to guess it and figure it out. Installing Password | + | Many people use the same password for most of their web applications so they wont have to remember numerous passwords for different applications. However, that makes it very easy for an intruder or a hacker to guess it and figure it out. Installing Password Management software would help eliminate this problem, as it keep all your user names and passwords, secret notes and serial numbers in one secured database file, and that database file has another password. Some people might still be concerned about having one password as a key to all other passwords, but the user needs to actually have your password file and password. |
=== Back Up your System === | === Back Up your System === | ||
- | It is crucial to back up your system, as there are many ways you can unintentionally lose information on a computer. | + | It is crucial to back up your system, as there are many ways you can unintentionally lose information on a computer. Regular backing up copies of your files and keep them in a separate place, makes it easier for you to get your files back in the event that something happened to your computer. |
== See Also == | == See Also == | ||
- | * [[ | + | * [[Network firewall]] |
- | * [[ | + | * [[Malware]] |
- | + | * [[Computer worms]] | |
- | + | * [[Denial Of Service Attacks]] | |
- | * [[Computer | + | |
- | * [[Denial | + | |
- | + | ||
- | + | ||
== References == | == References == |
Current revision as of 02:55, 13 April 2009
Security for Small Home Networks is a procedure to detect and obviate any attempt of unauthorized access to the computer.
Home wireless network is rarely secured, and therefore it is one of the most popular targets for intruders due to the fact that they can utilize it as a remote server for their applications in many inventive ways for their own purposes.
Contents |
Danger of Unsecure Small Home Network
Having unsecure home network is simply providing the intruder the chance to become a part of your local network, which may result in the usage of your broadband connection to get online without paying. However, the problems arise when an unauthorized user could abuse your connection for malicious purposes like hacking or any illegal act and since the intruder is connected to the your network, if the criminal activity is discovered and investigated, the origin of the attack will be traced back to your broadband account. More importantly, the intruder can completely take advantage of an unsecured wireless network by snooping around and steal confidential data and information from your machine or even destroying the information on it. The information damaged could be an application or the operating system resulting in a partial or complete breakdown of the machine.
Small Home Network Threats
Worms
Self replicating program produced without human interaction and travel across the network connections automatically. After it overtakes your computer, it searches for other listening computers to overtake, and so on. It uses system transmission capabilities to travel from machine to machine. Examples of worms can be email worm, instant messaging worms.
Virus
Is a piece of code that is written by deceitful programmer which copies itself and spread throughout your computer causing great harm to many of the computer programs. Unlike worms, viruses need to be executed to replicate, therefore most viruses are attached to executable files, and when the user get to run that executable the virus has the chance to reproduce. Sometimes the programs that got infected act as a virus themselves.
Spyware
They aren’t designed to damage your computer, spyware is a software that may run in the background and collects data about the user and monitor your internet surfing which may lead to identity theft. A spyware program is rarely alone on a computer, an affected machine usually has multiple infections. Users frequently notice some symptoms like slow of system performance, computer starts to behave strangely and in some cases users' computer setting might change and they wont be able to change it back. A common way to become a victim of spyware is to download certain peer-to-peer file swapping products.
Trojan Horse program
It is one of the most serious threats to computer security simply because it is a software program that appears to be harmless or useful, but in fact it is very harmful software that gets unauthorized control over your computer. Usually, Trojans create a "backdoor", which is used to send your personal information to another location which may lead to identity theft or sends your credit card numbers and passwords to a stranger. The most common means of infection is through email attachments.
Denial of Service
Attack that attempt to prevent authorized access to a system resource or delay system operations and functions, it essentially disables your computer or your network. Despite the fact that a DoS attack does not usually result in the theft of information or other security loss, it can cost the person or company a lot of money and time. Failure to access any web site and dramatic increase in the amount of spam you receive in your account would indicate DoS attack.
Ways to Secure Small Home Network
Network Firewall
a.Change the Default SSID
Devices come with a default system ID called the SSID (Service Set Identifier). Change the default SSID immediately when configuring wireless security on your network. Because if intruders found a default SSID, they figure that it is a poorly configured network and are much more likely to attack it. Use something unique, not something that can easily be guessed.
b.Change Administrator Password
Change the administrative password on your home wireless router when installing the unit so wireless snoopers can’t get into the router and mess around with its settings. The default passwords for popular models of wireless network are well-known to all intruders.
Enable Encryption
WPA(Short for Wi-Fi Protected Access) is a secure method of encrypting information sent over wireless networks. To enable WPA, generate WPA encryption key, copy and paste it into your wireless router's configuration panel. This would help securing your wireless network from traffic getting snooped or your bandwidth getting hijacked.
Web Filter
Web filters are essential for network security that prevents access to unauthorized or malicious web sites. Web filters monitor Web pages and control access to certain websites to determine whether it should be displayed to the user or not. Web filters checks the origin and the content of a Web page against a set of rules provided by company or person who has installed the Web filter. Web filters protect you from malware and many other network threats. Example of such web filter that you can download for free is K9.
Spam Filter
Just like a web filter, a spam filter looks at your e-mail and sorts it in order to identify and pull out spam mail. Users can install Spam filters either as separate programs, or as part of their e-mail program. Moreover, they can set the spam filter to compare parameters in the incoming mail to their desired lists. For example, a spam filter can be set to check the subject heading or the sender field. Spam filter will protect you from threats like worms and viruses. Example of Spam filter that can be installed is spamAware.
Install Antivirus Software
They are software that aims to identify, obviate and remove malicious software before they can infect your computer or destroy all your data. Most modern antivirus software can protect against a wide range of malware. If you've already got an antivirus program it is essential to keep your software updated, many of these programs will automatically update themselves when you are online. Having antivirus software running on your machine is absolutely crucial.
Install Firewall
Use Firewall because it acts as a protective barrier between your computer and the Internet and provides an extra layer of security where hackers and intruders could not break into your network. A firewall has the ability to block all traffic to and from a specific IP address, and protect it from viruses and worms etc. However, it is not sufficient to install a firewall and then ignore all other security measures.
Install Antispyware Software
Antispyware attempts to detect and eliminate all types of menacing spyware programs spyware that has been installed on your computer and it protects your privacy by removing cookies and software that track you on the Internet. It continuously updates itself to ensure better protection against the latest and most recent spyware programs. Most Antispyware software offers live technical support through its official website. Example of antispyware that can be installed for free is Ad-Aware.
Install Password Management Software
Many people use the same password for most of their web applications so they wont have to remember numerous passwords for different applications. However, that makes it very easy for an intruder or a hacker to guess it and figure it out. Installing Password Management software would help eliminate this problem, as it keep all your user names and passwords, secret notes and serial numbers in one secured database file, and that database file has another password. Some people might still be concerned about having one password as a key to all other passwords, but the user needs to actually have your password file and password.
Back Up your System
It is crucial to back up your system, as there are many ways you can unintentionally lose information on a computer. Regular backing up copies of your files and keep them in a separate place, makes it easier for you to get your files back in the event that something happened to your computer.
See Also
References
- Home Network Security.Retrieved April 9, 2009 .
- WHAT IS NETWORK SECURITY?.Retrieved April 10, 2009 .
- Security of the Internet.Retrieved April 10, 2009 .
- 10 Tips for Wireless Home Network Security.Retrieved April 10, 2009 .
- Home Network Security.Retrived April 9, 2009 .
- 10 Ways to Protect Your Home Network. Retrieved April 11, 2009.
- What is a spam filter.Retrived April 10, 2009 .
- How Computer Viruses Work.Retrived April 11, 2009 .
- Understanding Denial-of-Service Attacks.Retrived April 11, 2009 .
External Links
- How do I know if I have spyware on my computer?
- Trojan Horse Attacks.
- Adware and Spyware.
- K9 Web Protection.
- SpamAware.
- Ad-Aware.
ElMeniawyM 08:45, 12 April 2009 (EDT)