[AfrICANN-discuss] Home Network Security
Anne-Rachel Inné
annerachel at gmail.com
Wed Sep 30 13:39:59 SAST 2009
http://www.ibls.com/internet_law_news_portal_view.aspx?s=sa&id=1756 UNITED
STATES: Home Network SecurityMonday, September 28, 2009
This document gives home users an overview of the security risks and
countermeasures associated with Internet connectivity, especially in the
context of always-on or broadband access services (such as cable modems and
DSL). However, much of the content is also relevant to traditional dial-up
users (users who connect to the Internet using a modem).
Introduction<http://www.us-cert.gov/reading_room/home-network-security/#introduction>
1. Computer security<http://www.us-cert.gov/reading_room/home-network-security/#I>
1. What is computer
security?<http://www.us-cert.gov/reading_room/home-network-security/#I-A>
2. Why should I care about computer
security?<http://www.us-cert.gov/reading_room/home-network-security/#I-B>
3. Who would want to break into my computer at
home?<http://www.us-cert.gov/reading_room/home-network-security/#I-C>
4. How easy is it to break into my
computer?<http://www.us-cert.gov/reading_room/home-network-security/#I-D>
2. Technology<http://www.us-cert.gov/reading_room/home-network-security/#II>
1. What does "broadband"
mean?<http://www.us-cert.gov/reading_room/home-network-security/#II-A>
2. What is cable modem
access?<http://www.us-cert.gov/reading_room/home-network-security/#II-B>
3. What is DSL
access?<http://www.us-cert.gov/reading_room/home-network-security/#II-C>
4. How are broadband services different from traditional dial-up
services?<http://www.us-cert.gov/reading_room/home-network-security/#II-D>
5. How is broadband access different from the network I use at
work?<http://www.us-cert.gov/reading_room/home-network-security/#II-E>
6. What is a
protocol?<http://www.us-cert.gov/reading_room/home-network-security/#II-F>
7. What is
IP?<http://www.us-cert.gov/reading_room/home-network-security/#II-G>
8. What is an IP
address?<http://www.us-cert.gov/reading_room/home-network-security/#II-H>
9. What are static and dynamic
addressing?<http://www.us-cert.gov/reading_room/home-network-security/#II-I>
10. What is
NAT?<http://www.us-cert.gov/reading_room/home-network-security/#II-J>
11. What are TCP and UDP
ports?<http://www.us-cert.gov/reading_room/home-network-security/#II-K>
12. What is a
firewall?<http://www.us-cert.gov/reading_room/home-network-security/#II-L>
13. What does antivirus software
do?<http://www.us-cert.gov/reading_room/home-network-security/#II-M>
3. Computer security risks to home users
<http://www.us-cert.gov/reading_room/home-network-security/#III>
1. What is at
risk?<http://www.us-cert.gov/reading_room/home-network-security/#III-A>
2. Intentional misuse of your
computer<http://www.us-cert.gov/reading_room/home-network-security/#III-B>
1. Trojan horse
programs<http://www.us-cert.gov/reading_room/home-network-security/#III-B-1>
2. Back door and remote administration
programs<http://www.us-cert.gov/reading_room/home-network-security/#III-B-2>
3. Denial of
service<http://www.us-cert.gov/reading_room/home-network-security/#III-B-3>
4. Being an intermediary for another
attack<http://www.us-cert.gov/reading_room/home-network-security/#III-B-4>
5. Unprotected Windows
shares<http://www.us-cert.gov/reading_room/home-network-security/#III-B-5>
6. Mobile code (Java, JavaScript, and
ActiveX)<http://www.us-cert.gov/reading_room/home-network-security/#III-B-6>
7. Cross-site
scripting<http://www.us-cert.gov/reading_room/home-network-security/#III-B-7>
8. Email
spoofing<http://www.us-cert.gov/reading_room/home-network-security/#III-B-8>
9. Email-borne
viruses<http://www.us-cert.gov/reading_room/home-network-security/#III-B-9>
10. Hidden file
extensions<http://www.us-cert.gov/reading_room/home-network-security/#III-B-10>
11. Chat
clients<http://www.us-cert.gov/reading_room/home-network-security/#III-B-11>
12. Packet
sniffing<http://www.us-cert.gov/reading_room/home-network-security/#III-B-12>
3. Accidents and other
risks<http://www.us-cert.gov/reading_room/home-network-security/#III-C>
1. Disk
failure<http://www.us-cert.gov/reading_room/home-network-security/#III-C-1>
2. Power failure and
surges<http://www.us-cert.gov/reading_room/home-network-security/#III-C-2>
3. Physical
theft<http://www.us-cert.gov/reading_room/home-network-security/#III-C-3>
4. Actions home users can take to protect their computer
systems<http://www.us-cert.gov/reading_room/home-network-security/#IV>
1. Consult your system support personnel if you work from
home<http://www.us-cert.gov/reading_room/home-network-security/#IV-A-1>
2. Use virus protection
software<http://www.us-cert.gov/reading_room/home-network-security/#IV-A-2>
3. Use a firewall<http://www.us-cert.gov/reading_room/home-network-security/#IV-A-3>
4. Don�t open unknown email
attachments<http://www.us-cert.gov/reading_room/home-network-security/#IV-A-4>
5. Don�t run programs of unknown
origin<http://www.us-cert.gov/reading_room/home-network-security/#IV-A-5>
6. Disable hidden filename
extensions<http://www.us-cert.gov/reading_room/home-network-security/#IV-A-6>
7. Keep all applications (including your operating system)
patched<http://www.us-cert.gov/reading_room/home-network-security/#IV-A-7>
8. Turn off your computer or disconnect from the network when not in
use<http://www.us-cert.gov/reading_room/home-network-security/#IV-A-8>
9. Disable Java, JavaScript, and ActiveX if
possible<http://www.us-cert.gov/reading_room/home-network-security/#IV-A-9>
10. Disable scripting features in email
programs<http://www.us-cert.gov/reading_room/home-network-security/#IV-A-10>
11. Make regular backups of critical
data<http://www.us-cert.gov/reading_room/home-network-security/#IV-A-11>
12. Make a boot disk in case your computer is damaged or
compromised<http://www.us-cert.gov/reading_room/home-network-security/#IV-A-12>
Appendix: References and additional
information<http://www.us-cert.gov/reading_room/home-network-security/#appendix>
By US-CERT- Computer Emergency Readiness Team
-------------- next part --------------
An HTML attachment was scrubbed...
URL: https://lists.afrinic.net/pipermail/africann/attachments/20090930/0730e2af/attachment-0001.htm
More information about the AfrICANN
mailing list