<a href="http://www.ibls.com/internet_law_news_portal_view.aspx?s=sa&id=1756">http://www.ibls.com/internet_law_news_portal_view.aspx?s=sa&id=1756</a>
<div><h1><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-size: small;">UNITED STATES: Home Network Security</span></span></h1><div class="articleButtons"><span class="Apple-style-span" style="font-style: italic; ">Monday, September 28, 2009</span></div>
This
document gives home users an overview of the security risks and
countermeasures associated with Internet connectivity, especially in
the context of always-on or broadband access services (such as cable
modems and DSL). However, much of the content is also relevant to
traditional dial-up users (users who connect to the Internet using a
modem). <br>
<ol type="I">
<p><a href="http://www.us-cert.gov/reading_room/home-network-security/#introduction">Introduction</a></p>
<li><a href="http://www.us-cert.gov/reading_room/home-network-security/#I">Computer security</a>
<ol type="A">
<li><a href="http://www.us-cert.gov/reading_room/home-network-security/#I-A">What is computer security?</a>
</li><li><a href="http://www.us-cert.gov/reading_room/home-network-security/#I-B">Why should I care about computer security?</a>
</li><li><a href="http://www.us-cert.gov/reading_room/home-network-security/#I-C">Who would want to break into my computer at home?</a>
</li><li><a href="http://www.us-cert.gov/reading_room/home-network-security/#I-D">How easy is it to break into my computer?</a> </li></ol>
</li><li><a href="http://www.us-cert.gov/reading_room/home-network-security/#II">Technology</a>
<ol type="A">
<li><a href="http://www.us-cert.gov/reading_room/home-network-security/#II-A">What does "broadband" mean?</a>
</li><li><a href="http://www.us-cert.gov/reading_room/home-network-security/#II-B">What is cable modem access?</a>
</li><li><a href="http://www.us-cert.gov/reading_room/home-network-security/#II-C">What is DSL access?</a>
</li><li><a href="http://www.us-cert.gov/reading_room/home-network-security/#II-D">How are broadband services different from traditional dial-up services?</a>
</li><li><a href="http://www.us-cert.gov/reading_room/home-network-security/#II-E">How is broadband access different from the network I use at work?</a>
</li><li><a href="http://www.us-cert.gov/reading_room/home-network-security/#II-F">What is a protocol?</a>
</li><li><a href="http://www.us-cert.gov/reading_room/home-network-security/#II-G">What is IP?</a>
</li><li><a href="http://www.us-cert.gov/reading_room/home-network-security/#II-H">What is an IP address?</a>
</li><li><a href="http://www.us-cert.gov/reading_room/home-network-security/#II-I">What are static and dynamic addressing?</a>
</li><li><a href="http://www.us-cert.gov/reading_room/home-network-security/#II-J">What is NAT?</a>
</li><li><a href="http://www.us-cert.gov/reading_room/home-network-security/#II-K">What are TCP and UDP ports?</a>
</li><li><a href="http://www.us-cert.gov/reading_room/home-network-security/#II-L">What is a firewall?</a>
</li><li><a href="http://www.us-cert.gov/reading_room/home-network-security/#II-M">What does antivirus software do?</a> </li></ol>
</li><li><a href="http://www.us-cert.gov/reading_room/home-network-security/#III">Computer security risks to home users </a>
<ol type="A">
<li><a href="http://www.us-cert.gov/reading_room/home-network-security/#III-A">What is at risk?</a>
</li><li><a href="http://www.us-cert.gov/reading_room/home-network-security/#III-B">Intentional misuse of your computer</a>
<ol>
<li><a href="http://www.us-cert.gov/reading_room/home-network-security/#III-B-1">Trojan horse programs</a>
</li><li><a href="http://www.us-cert.gov/reading_room/home-network-security/#III-B-2">Back door and remote administration programs</a>
</li><li><a href="http://www.us-cert.gov/reading_room/home-network-security/#III-B-3">Denial of service</a>
</li><li><a href="http://www.us-cert.gov/reading_room/home-network-security/#III-B-4">Being an intermediary for another attack</a>
</li><li><a href="http://www.us-cert.gov/reading_room/home-network-security/#III-B-5">Unprotected Windows shares</a>
</li><li><a href="http://www.us-cert.gov/reading_room/home-network-security/#III-B-6">Mobile code (Java, JavaScript, and ActiveX)</a>
</li><li><a href="http://www.us-cert.gov/reading_room/home-network-security/#III-B-7">Cross-site scripting</a>
</li><li><a href="http://www.us-cert.gov/reading_room/home-network-security/#III-B-8">Email spoofing</a>
</li><li><a href="http://www.us-cert.gov/reading_room/home-network-security/#III-B-9">Email-borne viruses</a>
</li><li><a href="http://www.us-cert.gov/reading_room/home-network-security/#III-B-10">Hidden file extensions</a>
</li><li><a href="http://www.us-cert.gov/reading_room/home-network-security/#III-B-11">Chat clients</a>
</li><li><a href="http://www.us-cert.gov/reading_room/home-network-security/#III-B-12">Packet sniffing</a> </li></ol>
</li><li><a href="http://www.us-cert.gov/reading_room/home-network-security/#III-C">Accidents and other risks</a>
<ol>
<li><a href="http://www.us-cert.gov/reading_room/home-network-security/#III-C-1">Disk failure</a>
</li><li><a href="http://www.us-cert.gov/reading_room/home-network-security/#III-C-2">Power failure and surges</a>
</li><li><a href="http://www.us-cert.gov/reading_room/home-network-security/#III-C-3">Physical theft</a> </li></ol></li></ol>
</li><li><a href="http://www.us-cert.gov/reading_room/home-network-security/#IV">Actions home users can take to protect their computer systems</a>
<ol>
<li><a href="http://www.us-cert.gov/reading_room/home-network-security/#IV-A-1">Consult your system support personnel if you work from home</a>
</li><li><a href="http://www.us-cert.gov/reading_room/home-network-security/#IV-A-2">Use virus protection software</a>
</li><li><a href="http://www.us-cert.gov/reading_room/home-network-security/#IV-A-3">Use a firewall</a>
</li><li><a href="http://www.us-cert.gov/reading_room/home-network-security/#IV-A-4">Don�t open unknown email attachments</a>
</li><li><a href="http://www.us-cert.gov/reading_room/home-network-security/#IV-A-5">Don�t run programs of unknown origin</a>
</li><li><a href="http://www.us-cert.gov/reading_room/home-network-security/#IV-A-6">Disable hidden filename extensions</a>
</li><li><a href="http://www.us-cert.gov/reading_room/home-network-security/#IV-A-7">Keep all applications (including your operating system) patched</a>
</li><li><a href="http://www.us-cert.gov/reading_room/home-network-security/#IV-A-8">Turn off your computer or disconnect from the network when not in use</a>
</li><li><a href="http://www.us-cert.gov/reading_room/home-network-security/#IV-A-9">Disable Java, JavaScript, and ActiveX if possible</a>
</li><li><a href="http://www.us-cert.gov/reading_room/home-network-security/#IV-A-10">Disable scripting features in email programs</a>
</li><li><a href="http://www.us-cert.gov/reading_room/home-network-security/#IV-A-11">Make regular backups of critical data</a>
</li><li><a href="http://www.us-cert.gov/reading_room/home-network-security/#IV-A-12">Make a boot disk in case your computer is damaged or compromised</a> </li></ol>
<p><a href="http://www.us-cert.gov/reading_room/home-network-security/#appendix">Appendix: References and additional information</a> </p></li></ol>
<p>By US-CERT- Computer Emergency Readiness Team</p></div>