[AfrICANN-discuss] Home Network Security

Anne-Rachel Inné annerachel at gmail.com
Wed Sep 30 13:39:59 SAST 2009


http://www.ibls.com/internet_law_news_portal_view.aspx?s=sa&id=1756 UNITED
STATES: Home Network SecurityMonday, September 28, 2009
This document gives home users an overview of the security risks and
countermeasures associated with Internet connectivity, especially in the
context of always-on or broadband access services (such as cable modems and
DSL). However, much of the content is also relevant to traditional dial-up
users (users who connect to the Internet using a modem).


   Introduction<http://www.us-cert.gov/reading_room/home-network-security/#introduction>
   1. Computer security<http://www.us-cert.gov/reading_room/home-network-security/#I>
      1. What is computer
security?<http://www.us-cert.gov/reading_room/home-network-security/#I-A>
      2. Why should I care about computer
security?<http://www.us-cert.gov/reading_room/home-network-security/#I-B>
      3. Who would want to break into my computer at
home?<http://www.us-cert.gov/reading_room/home-network-security/#I-C>
      4. How easy is it to break into my
computer?<http://www.us-cert.gov/reading_room/home-network-security/#I-D>
   2. Technology<http://www.us-cert.gov/reading_room/home-network-security/#II>
      1. What does "broadband"
mean?<http://www.us-cert.gov/reading_room/home-network-security/#II-A>
      2. What is cable modem
access?<http://www.us-cert.gov/reading_room/home-network-security/#II-B>
      3. What is DSL
access?<http://www.us-cert.gov/reading_room/home-network-security/#II-C>
      4. How are broadband services different from traditional dial-up
      services?<http://www.us-cert.gov/reading_room/home-network-security/#II-D>
      5. How is broadband access different from the network I use at
work?<http://www.us-cert.gov/reading_room/home-network-security/#II-E>
      6. What is a
protocol?<http://www.us-cert.gov/reading_room/home-network-security/#II-F>
      7. What is
IP?<http://www.us-cert.gov/reading_room/home-network-security/#II-G>
      8. What is an IP
address?<http://www.us-cert.gov/reading_room/home-network-security/#II-H>
      9. What are static and dynamic
addressing?<http://www.us-cert.gov/reading_room/home-network-security/#II-I>
      10. What is
NAT?<http://www.us-cert.gov/reading_room/home-network-security/#II-J>
      11. What are TCP and UDP
ports?<http://www.us-cert.gov/reading_room/home-network-security/#II-K>
      12. What is a
firewall?<http://www.us-cert.gov/reading_room/home-network-security/#II-L>
      13. What does antivirus software
do?<http://www.us-cert.gov/reading_room/home-network-security/#II-M>
   3. Computer security risks to home users
   <http://www.us-cert.gov/reading_room/home-network-security/#III>
      1. What is at
risk?<http://www.us-cert.gov/reading_room/home-network-security/#III-A>
      2. Intentional misuse of your
computer<http://www.us-cert.gov/reading_room/home-network-security/#III-B>
         1. Trojan horse
programs<http://www.us-cert.gov/reading_room/home-network-security/#III-B-1>
         2. Back door and remote administration
programs<http://www.us-cert.gov/reading_room/home-network-security/#III-B-2>
         3. Denial of
service<http://www.us-cert.gov/reading_room/home-network-security/#III-B-3>
         4. Being an intermediary for another
attack<http://www.us-cert.gov/reading_room/home-network-security/#III-B-4>
         5. Unprotected Windows
shares<http://www.us-cert.gov/reading_room/home-network-security/#III-B-5>
         6. Mobile code (Java, JavaScript, and
ActiveX)<http://www.us-cert.gov/reading_room/home-network-security/#III-B-6>
         7. Cross-site
scripting<http://www.us-cert.gov/reading_room/home-network-security/#III-B-7>
         8. Email
spoofing<http://www.us-cert.gov/reading_room/home-network-security/#III-B-8>
         9. Email-borne
viruses<http://www.us-cert.gov/reading_room/home-network-security/#III-B-9>
         10. Hidden file
extensions<http://www.us-cert.gov/reading_room/home-network-security/#III-B-10>
         11. Chat
clients<http://www.us-cert.gov/reading_room/home-network-security/#III-B-11>
         12. Packet
sniffing<http://www.us-cert.gov/reading_room/home-network-security/#III-B-12>
      3. Accidents and other
risks<http://www.us-cert.gov/reading_room/home-network-security/#III-C>
         1. Disk
failure<http://www.us-cert.gov/reading_room/home-network-security/#III-C-1>
         2. Power failure and
surges<http://www.us-cert.gov/reading_room/home-network-security/#III-C-2>
         3. Physical
theft<http://www.us-cert.gov/reading_room/home-network-security/#III-C-3>
      4. Actions home users can take to protect their computer
systems<http://www.us-cert.gov/reading_room/home-network-security/#IV>
      1. Consult your system support personnel if you work from
home<http://www.us-cert.gov/reading_room/home-network-security/#IV-A-1>
      2. Use virus protection
software<http://www.us-cert.gov/reading_room/home-network-security/#IV-A-2>
      3. Use a firewall<http://www.us-cert.gov/reading_room/home-network-security/#IV-A-3>
      4. Don�t open unknown email
attachments<http://www.us-cert.gov/reading_room/home-network-security/#IV-A-4>
      5. Don�t run programs of unknown
origin<http://www.us-cert.gov/reading_room/home-network-security/#IV-A-5>
      6. Disable hidden filename
extensions<http://www.us-cert.gov/reading_room/home-network-security/#IV-A-6>
      7. Keep all applications (including your operating system)
patched<http://www.us-cert.gov/reading_room/home-network-security/#IV-A-7>
      8. Turn off your computer or disconnect from the network when not in
      use<http://www.us-cert.gov/reading_room/home-network-security/#IV-A-8>
      9. Disable Java, JavaScript, and ActiveX if
possible<http://www.us-cert.gov/reading_room/home-network-security/#IV-A-9>
      10. Disable scripting features in email
programs<http://www.us-cert.gov/reading_room/home-network-security/#IV-A-10>
      11. Make regular backups of critical
data<http://www.us-cert.gov/reading_room/home-network-security/#IV-A-11>
      12. Make a boot disk in case your computer is damaged or
compromised<http://www.us-cert.gov/reading_room/home-network-security/#IV-A-12>

   Appendix: References and additional
information<http://www.us-cert.gov/reading_room/home-network-security/#appendix>


By US-CERT- Computer Emergency Readiness Team
-------------- next part --------------
An HTML attachment was scrubbed...
URL: https://lists.afrinic.net/pipermail/africann/attachments/20090930/0730e2af/attachment-0001.htm


More information about the AfrICANN mailing list