Monday, January 24, 2011

Broadband security

Install and regularly update an Anti-Virus package

Many Anti-virus programs will block any attempts made by websites, online programs or other computers to connect with your computer - a message window will pop up asking you to either permit the connection or block it. If you know that the connection is safe (if you are talking to a friend on MSN, AIM, Skype, etc) then you can approve it.
If you are browsing an unfamiliar website and an attempt at a connection is made, it is best to deny it if you are unsure; if in doubt it is not worth the risk of compromising your computer's safety.
New virus codes are conceivably written every day - anti-virus programs will need to regularly download updates from to ensure that their libraries are constantly renewed and revised so that your anti-virus package can deal with new and emerging types of virus.
Usually, when new updates are made available, your anti-virus program will begin downloading them the next time that your computer is switched on - you will probably experience a bit of slowdown while this is happening. It is a good idea not to use the Internet whilst updates are being installed - wait for the updating process to be finished before doing anything else.

Install a Firewall

Firewalls can protect from internal and external threats. It is essentially a computer system that sits between the Internet and a computer or network, and regulates traffic between the two. As the term suggests, a firewall is an extra wall of security built into computers on a network, which restricts access to systems from the outside world. Firewalls protect against hackers and malicious intruders.
Most operating systems, including Windows XP and OS X will come with their own built-in firewalls. Some popular firewalls software includes Norton Personal Firewall, ZoneAlarm Pro Firewall and Sygate Personal Firewall - some ISPs included these programs as standard with their Internet service packages, and some companies will have their own brand of security software which will include a personal firewall program.
Whichever firewall you chose, you must install and configure it correctly before connecting to the net for the first time.

Safeguard your wireless connection

With Wi-Fi, Bluetooth and many other wireless-enabled devices becoming more and more commonplace in homes, and with many mobile phone handsets capable of making calls over a home network and the public mobile networks simultaneously, it is just as important that you secure your wireless connections from external intrusions which are just as likely to come from the 'real' outside world as well as the online world. It is possible for users to poach, or 'leech' off of your internet connection and use services that you are paying for. Your connection could potentially be used for illegal means, for which you could be prosecuted. When setting up a wireless connection that will be accessed by multiple users in your household or office, there are a number of things you should consider:

- The position of your wireless hub -

Place your wireless base unit as close to the centre of your home or workspace as possible; not only does this mean that coverage is evenly spread out around the building, meaning that connection speeds should be fairly equal, but is also means that there will be less exterior leaking of the signal.
Of course, when setting up your hub you will also want to position it so that distance between peripheral machines and the hub itself is minimal. As masonry and in particular metal affects the signal, you will want to position everything so that the signals travel through as few walls as possible. You should ideally strike a balance between the usability and security of your network.
Careful positioning of your hub will limit the chances of somebody leeching your connection in the first place, so this is an important first step to take.

- Make sure your network is encrypted -

Probably the most effective way of safeguarding your wireless network is to ensure that some form encryption is running. Encryption simply means that any information relayed between systems - in this case, your hub and the machines connected to it - will be automatically encoded so that it cannot be understood or used by anybody outside the network.
All devices which are Wi-Fi enabled and carry the trademarked Wi-Fi logo come with the WPA2 encryption protocol installed as standard - WPA2 is considered to be the most secure form of encryption available.
Some older wireless routers come with the older WEP and WPA encryption standard installed - these offer you a measure of protection, with WPA being the better of the two.

- Securing your SSID -

An SSID, short for Service Set Identifier, is a code similar to a PIN number in terms of its function. As with encryption, when you set up a network, there will be a section in the instructions which come with your wireless device, which will allow you to create a password to be used for your SSID. It is important to ensure that your SSID is 'hidden' and only available to those in your home/office; anyone wanting access to your network would be required to enter the SSID first, which would prevent people outside from gaining access.
As with all passwords, be sure to choose an SSID which doesn't contain any obvious information such as names, addresses, dates of birth, etc. Choose something which is a mixture of numbers and different cases. This is what you should also consider as a golden rule of internet use; be aware of phishing and pharming.

- Phishing -

All users of email will be familiar with spam, the junk mail of the Internet. It is possible that spam emails from an unknown address could contain an attachment with a virus. Spam is usually just an annoyance and doesn't affect the security of your system. However, attachments from unknown senders can contain viruses that can attack your systems and try to steal your data.
A relatively new email security threat to look out for is 'phishing', which involves the acquisition of valuable personal data, such as bank details or passwords via a fake email, posing as a legitimate company or bank, sent to a user. These emails are designed to look like an email from a genuine company, and will contain logos taken directly from legitimate sites.
However, any email that asks you to enter your personal account information or access your account is probably fraudulent; most banks will contact clients via the post, as a signed letter is the official recognised form of correspondence.

- Pharming -

You should also be wary of emails supposedly sent from companies which ask you to click on a link to confirm your security details as you could end up unwittingly supplying a hacker with everything
Advanced forms of phishing include a technique which is also referred to as 'pharming', where hackers use JavaScript to write codes which hide in the background of certain websites. When a host site is visited by a user, the code will then attempt to gain access to the router, in order to reconfigure its server settings.
Once this is done, it will then point the user in the direction of hoax websites that are designed to mirror legitimate ones, such as PayPal, Nochex, eBay, etc. Users thinking they are accessing a secure site will then enter security information such as passwords and credit card numbers which are then sent back to the author of the code.

How to check for secure websites

When entering your credit card details to pay for an Internet purchase, or when checking your Internet banking online, always make sure that you check that the following are present:
  • The text prefix 'http' in the address/title of the web browser is present.
  • An icon in the bottom right of the Internet Browser - usually a small padlock - which signifies that transmissions of data are encrypted. However, this is not necessarily indicative of a website's legitimacy, although if your browser does not display a padlock, this means that the site you are currently viewing is unsecured.
  • Read the privacy policy of retail sites regarding their use of third party information - be suspicious of any site which does not explicitly say how they manage cookies or browser information, or does not even have a privacy policy at all.
  • Many online retailers run Secure Sockets Layer (SSL) software, which automatically protects any registered information. Visa, MasterCard, and American Express all endorse SSL for commerce over the Internet. Network infrastructure companies such as VeriSign and GeoTrust who sell .com and .net domain names provide SSL encryption to several commercial websites; look for their logos for proof of online retailers' credentials.

Broadband Security Overview

  • Install an effective anti-virus package including anti-spyware and ensure updates are carried out regularly.
  • Install and configure a suitable Firewall.
  • Use common sense – it is risky to download dubious programs from the internet and do not respond to pop-up windows offering you free software. Installing a pop-up blocker, or using a browser such as Mozilla Firefox should minimize the number of pop-ups.
  • Be suspicious of emails from established companies that ask you to confirm your security details, and never send out sensitive information such as passwords over email at all.
  • Ensure that online retailers operate a strict privacy policy and make sure that the site secures any personal details with SSL.
  • If you are running a wireless network, ensure that it is fully encrypted - aim for WPA2 - and that your router is optimally placed around your household/office to minimise the possibility of leeching.
Source from : broadband finder

No comments:

Post a Comment