• Skip to main content
  • Skip to primary sidebar
  • Skip to footer

securitywing

Menu
  • About
  • Must Read
      • IIS Performance Boost
      • RFID Security
      • Web App Security Testing
      • How to Secure Home Network
      • Prevent Cross-Site Scripting Attacks
      • Renew Self-Signed Certificates
      • Penetration Testing Tools
      • VPN Concentrator
      • Forensic Investigation Tools
      • Digital Certificates
      • Cloud Security Issues
      • Advanced Evasion Prevention
      • Firewall Types
      • Tips to Prevent Data Exfiltration
      • Classified Info Handling
      • MySQL Security
      • Definition of 7 Types of Malware
      • VOIP Security
      • Why Antivirus Software Fails
      • 15 Network Security Vulnerabilities
      • Web App Security
      • IT Security Standards
      • Types of Virtualization
      • Android Security
      • Digital Signature
      • Advanced Malware Protection
    • Close
  • Consultancy
  • Contact

20 Ways to Secure Home Network

by wing

Almost every Internet user has their home network that every family member use to Internet access.For your home network security you can follow a few simple steps to eliminate the chances of your network being compromised. Before diving deep into the home network security issues, you may have a look at the vulnerability points in your network,  including your client machine.

home router network securiyt

 The most vulnerable points of home networks are:

  • Router security settings
  • Security settings of Wi-Fi network
  • Security of client machines/OS

Home router security

  1. Your home router is the access point to the Internet. A handful of free tools and techniques that can be used to break your network security have been discussed in the in this post.As a first step to secure your home network,  you need to make sure you router is located in a physically secure location.
  2. Packet sniffers capture all data passing through the network. Though it is unlikely that anyone will install packet sniffer in your home network, there is a possibility that someone can tap your network, and use packet sniffer to capture the data packets. Look out for if there is any such device plugged into your network ports.
  3. Password crackers sniff data from the network. Usually a sniffer analyze the network data, just like the packet sniffer, and then brute-force to decipher the encrypted passwords.
  4. Network scanners are used to explore networks and host machines (server or client computer). Most of the home routers provide access-log that you can analyze to see to if there are any scanning type attack to your network. Normally, scanning is done only for reconnaissance purpose. You can run a network scan of your network to reveal which ports and services are vulnerable in your network. To tighten your network security, disable all the unused ports and services in your client machine.
  5. every router can be managed with remote access ports. Normally, vendors configure SSH (secure socket shell) in order to provide remote support to the customers. Talk to your Internet service provider to know if they are using any kind of remote access technique to remotely login to your router. If you discover that they have remote access, make sure they use some sort of encryption technique to access to your router.

 

Wi-Fi Sniffers

  1. Wireless sniffers identify wireless signals in the nearby area and extract data from it. So, no matter how your Wi-Fi router is secured, anyone outside of your house can still sniff wireless transmission, and extract the information from it. Therefore, make sure your Wi-Fi device is using a strong encryption method and keys.

Client machine security

  1. Keystroke loggers are small piece of software installed in a machine, which can record users’ keystrokes. Even if you use the strongest password of the world, the keyloggers can record it and send it to a specific destination machine. Always scan your machine to make sure if someone has installed key loggers to steal your sensitive information.
  2. Remote administration tools such as remote desktop, VNC can allow remote users to take control of your system. Many remote IT support company choose to use remote administrative tools to provide technical support to their customers. Make sure you allow remote access to your system only when you need it. If you are a Windows user disable remote assistance and remote desktop connection as shown below:windows remote desktop
  3. Browser security: as you know that web browsers work as a gateway to the World Wide Web. Make sure your browser does not have unnecessary plugins and add-ons. Before installing any plugins, you can check if that plugin has any security issues. Turn off JavaScript, Java, Active X, which means client side mobile scripts need to be disabled if you don’t need them.
  4. Keep patching all your application software (Microsoft word, Adobe, PDF reader etc.)
  5. Run security updates of your operating system regularly. If possible update your OS.
  6. Never download and install unknown applications. Use only the application that has good security ratings. Before buying any application, research about its security history.
  7. Use a reputed Internet security solutions or antivirus scanner.
  8. Do not open unsolicited emails and avoid clicking links unless you know the sender. Remember that by clicking on a link you may allow a script to be installed surreptitiously in your computer.
  9. Learn about rootkits and use rootkit removal tools. Not all antivirus are smart enough in detecting rootkit.
  10. When you do not use your computer, disconnect it from the Internet.
  11. Pay attention to if your computer is running slower than before and look out for unusual behavior of you machine.
  12. Avoid downloading free software from unknown software. If you have to download a open source apps, then download it from the official site of the application.Remember that the attackers can infect any apps with malicious codes, and upload it to their website from free download.
  13. Do you have any network shared drive? If you are unsure about who have the rights to view your shared drives or files.If you do not understand how shared drive works, seek advice from some who knows.
  14. Beware of the cloud drive and its public share option. Do you have any publicly accessible folder in your cloud storage? Remember that if anyone uploads malicious program in your cloud drive, your own device might automatically copy that file from your cloud, which means your device is no longer secure.

To recap, turn off unnecessary services and ports that is not required and use a personal firewall or Internet security solutions in your network and beware of the inherent vulnerability of your operation system. No matter how many times you patch up your OS and applications, your system will always remain a target for zero-day vulnerabilities. Whenever you suspect that your computer has been compromised, disconnect it from the Internet by turning off Wi-Fi network interface or unplugging the network cable. Stay suspicious and informed.

 

Related Posts:

  • Tips for Network Security Breach Investigation
  • 32 Effective Home Security Checklist
  • How to Protect Networks against Advanced Evasion Techniques(AET)
  • Top 20 Windows Server Security Hardening Best Practices
  • 3 Simple Steps to Secure Gmail Account from Hackers

Filed Under: Network Security Tips Tagged With: home, network, router, security

Primary Sidebar

CISSP Sample Test

Take a CISSP Sample Test

CISA IT governance Sample test



Twitter Follow @securitywing

Categories

  • AWS
  • containers
  • Internet Security and Safety
  • IS Audit
  • IT Security Exams
  • Network Security Tips
  • Off Track
  • Telecom
  • Tutorial

Pages

  • About
  • Best IT Security Certification Exam
  • CISA IT governance Sample test
  • CISA Sample Test
  • CISSP Sample Test Online
  • Consultancy
  • Contact

Popular Posts

  • 3 Steps to Install Miniku...
  • 7 Different Types of Fire...
  • Top 10 RFID Security Conc...
  • How to Renew Self-Signed...
  • 8 Effective Ways to Impro...
  • What is Digital Certifica...
  • How to Setup AWS CloudFro...
  • How to Configure AAA (TAC...
  • 3 Simple Steps to Capture...
  • How to install a new Goda...

Footer

Copyrights

Protected by Copyscape Duplicate Content Detection Software

Securitywing.com reserves the copyrights of all of its published articles.No contents of this site is permitted to be published to anywhere else in the Internet.If any contents are found in any other websites, securitywing reserves the rights to file a DMCA complaint. But you have the right to use the link of any relevant article of this site to point from your website if you consider that it might improve the quality of your article.

Tags

antivirus audit AWS backup browser check cisco cloud computer cyber data database encryption firewall home hsrp ids informaiton internet intrusion it kubernetes linux load balancing malware network protection putty risk router security security tips server ssh SSL switch tools virus vpn vulnerability web webserver website windows wordpress

Copyright © 2010-2023 ·All Rights Reserved · SecurityWing.com