From: Norman J. Jacknis (email@example.com)
Date: Mon Jul 16 2001 - 19:35:51 EDT
This article from the CERT (computer security team) is a useful follow up to our last meeting and a subject for one of our fall meetings.
CERTŪ Coordination Center
Home Network Security
This document gives home users an overview of the security risks and countermeasures associated with Internet connectivity, especially in the context of "always-on" or broadband access services (such as cable modems and DSL). However, much of the content is also relevant to traditional dial-up users (users who connect to the Internet using a modem).
A.What is computer security?
B.Why should I care about computer security?
C.Who would want to break into my computer at home?
D.How easy is it to break into my computer?
A.What does "broadband" mean?
B.What is cable modem access?
C.What is DSL access?
D.How are broadband services different from traditional dial-up services?
E.How is broadband access different from the network I use at work?
F.What is a protocol?
G.What is IP?
H.What is an IP address?
I.What are static and dynamic addressing?
J.What is NAT?
K.What are TCP and UDP ports?
L.What is a firewall?
M.What does antivirus software do?
III.Computer security risks to home users
A.What is at risk?
B.Intentional misuse of your computer
1.Trojan horse programs
2.Back door and remote administration programs
3.Denial of Service
4.Being an intermediary for another attack
5.Unprotected Windows shares
10.Hidden file extensions
C.Accidents and other risks
2.Power failure and surges
IV.Actions home users can take to protect their computer systems
1.Consult your system support personnel if you work from home
2.Use virus protection software
3.Use a firewall
4.Don't open unknown e-mail attachments
5.Don't run programs of unknown origin
6.Disable hidden filename extensions
7.Keep all applications (including your operating system) patched
8.Turn off your computer or disconnect from the network when not in use
10.Disable scripting features in e-mail programs
11.Make regular backups of critical data
12.Make a boot disk in case your computer is damaged or compromised
Appendix: References and additional information
This archive was generated by hypermail 2.1.2 : Fri May 31 2002 - 23:55:02 EDT