Malice
BMFH
- Joined
- Mar 26, 2001
- Messages
- 12,734
- Reaction score
- 0
- Points
- 31
Here is a new document I have written:
Comprehensive PC Security Instruction for Home Users
This document is meant to help individuals at home or even in a small office, understand the different levels of security for computing online. This covers the most common items, as there are always new and ever evolving issues to deal with while online. This document will be separated into fundamental categories. Each category then, will have several subsections:
Security on a PC is a combination of the below:
1) External Firewall
2) Wireless Configuration (if you have wireless)
3) Patching your PC
4) Software - Firewalls
5) Software - Antivirus
6) Software - Spyware
7) Local Behaviors
The above categories describe security as it typically occurs in an individuals house. Starting with number 1, the External Firewall, working its way from there into your local PC, and even describing your PC habits, as they typically can be the biggest problem.
Hopefully, after reading this, you will better understanding of security and what is generally good behavior and what may not be.
1 - External Firewall
The outer most part of a home network, is the Digital Modem that attaches to the ISP, thru DSL or a Cable connection. This digital modem basically builds the connection to your ISP.
Before Routers and Firewalls were built, this digital modem was connected to your computer directly. Now, we need to put a Router in between the Modem and your computer. This router, has a built-in firewall that is by far your number one protection from the internet, if I had to say what is the most important at this point, the router/firewall is it.
Hardware Firewalls now today, have NUMEROUS functions that will benefit you, and things you MUST do once you install it.
a) Change the Admin Password
The Administrator account to the router, make sure to change this password IMMEDIATELY, because they all come with the same username and password when you unbox them. Hackers know this and try to exploit that users don't change the password.
b) Turn off UPnP
This is Universal Plug and Play. This is currently not a security flaw, but I see this as being a potential attack vector in the future.
c) Wireless settings
(this will be described in the next section)
d) Disable WAN administration
To configure your router, you have to goto the IP address of the router, and it shows the web interface. Now, in the configuration of the router there is an option to DISABLE accessing the Configuration Screen from the WAN. This means people outside your router (the Internet) are forbidden to access your routers configuration screens, only those on the internet network.
e) Use Network Address Translation
Use NAT (Network Address Translation) on your internal network. I believe most router/firewalls already have this setup. Doing this adds a layer of protection for your computer.
If you want to hear a podcast describing the use of a hardware firewall, and the purpose of NAT, please listen to this Security Now episode that was one of the first, its about a half hour.
Speaking strictly for myself, I use a Linksys Router with a 4 port switch and Wireless. The link to the router in particular is:
http://www.linksys.com The Wireless Router I use is - WRT54G
Just a few of the most common companies that produce routers are NetGear and DLink as well.
Why should you have a router?
I will clarify this for those users that have DSL or Cable Modems, and not really get into Dialup. When a user has DSL or Cable, they connect their computer via a Crossover RJ-45 cable to the DSL or Cable Modem. This modem communicates with the provider of your Internet Service. The IP you get, is what I call a "LIVE" IP. This means you are directly located on the Internet with no hardware borders separating you from the "LIVE" Internet. This in an ideal world would not be a problem.
But we dont live in this idea world. When you are on the LIVE internet your PC is able to be "touched" by other computers on the net. This is generally a very bad thing. For example, if a virus was active in the "Wild" then your IP address is accessible. This means, the virus can try to access your computer with your IP address and try to infect it. Hackers can do the same.
These are easilly installed and getting running can take about 20 minutes to get setup properly.
This router/firewall is configured by default to block all incoming connections. This is basically where the vulnerability is for a PC, block all unknown connections.
Great Links:
Security Now Podcast - Episode 003 - http://aolradio.podcast.aol.com/sn/SN-003.mp3
2 - Wireless Configuration
Assuming you have Wireless, read this, if you dont, go onto the next section named Patching.
Now, Wireless Configuration is a wonderful thing. I will give you some guidance on this. Assuming your PC and your new wireless router have the same type of wireless, then you are ready to go.
Here are the things that you need to do, once you install your Wireless Network Router:
a) DO NOT USE WEP
WEP (Wireless Encryption Protocol) is what was a good encryption scheme implemented badly. Its easy to crack. Do not use this unless you honestly, have no other choice.
b) Do NOT ONLY use MAC Filtering
Before I start, I want to clarify that MAC filtering is not to be used as your ONLY level of security on your wireless network. MAC Filtering should be used in addition to WPA (listed in the next option) as your encryption. If you use wireless encryption, MAC Filtering is not needed, but just adding another level of security.
Let me explain MAC filtering. Every network card in the world, wired and wireless, has a completely unique address hard coded into it. This is called the MAC address. In a wireless environment, theoretically you could use your router to not allow ANY MAC addresses but those you configure in the router, but unfortunately, this is easy to bypass. If someone wanted to access your network, all they have to do, is know a MAC address that DOES have access your network. They simply need to be physically located near your wireless router (outside in a car at the curb for instance) and start sniffing the air for any data being sent. The hacker can then look in this data and actually pull a MAC address from this data. Using another program to spoof his MAC address, he could then access your network. This is why MAC Filtering as your only level of Wireless Security is not advisable.
c) Use WPA
WPA is an acronym for Wi-Fi Protected Access. This is very powerful encryption protocol for your wireless connection. This means, if you set this up, someone seeing the wireless data in the air, would see data that is completely encrypted and unreadable.
When setting up WPA, make sure to use a password (or also named KEY) of at least 20 characters.
d)Turn off Wireless Administrator Privledges
Set your router to NOT allow Wireless connections to manage (making configuration changes) your wireless router. This is very important. If someone was driving by and did gain access to your network, they couldn't access your router, only someone WIRED to the switch where your router is can connect to the router admin panel and make changes.
You need to setup some sort of Wireless Encryption on your wireless network to protect yourself.
Remember, if you have a NON-Encrypted wireless network, someone can logon to your network and perform illegal activities, and since they are on your network, the authorities will come to you. This ALONE is incentive to do this.
Great Links:
Security Now Podcast - Episode 010 - http://aolradio.podcast.aol.com/sn/SN-010.mp3
Security Now Podcast - Episode 011 - http://aolradio.podcast.aol.com/sn/SN-011.mp3
3 - Patching
Every complex software application has bugs in it. This goes for Operating Systems also. Millions of copies of Microsoft's Windows operating system have been sold and are in use by home users and by corporations. Eventually bugs are found that lead to security breaches. To solve this, Microsoft releases patches to the operating system to patch security holes in the operating system. They do this on the Second Tuesday of each month. This is called Patch Tuesday.
That being said, I would suggest that you setup Microsoft's automated system to download the patches or you manually goto their windowsupdate website to download the patches manually.
I cannot stress how important this is. These holes are what virus writers and spyware makers use to compromise your system. This is so important, most corporations have groups of individuals that investigate these patches each month and are in charge or pushing them out to the users desktops and servers throughout the month.
Great Links:
Microsoft's Windows Update http://windowsupdate.microsoft.com
Comprehensive PC Security Instruction for Home Users
This document is meant to help individuals at home or even in a small office, understand the different levels of security for computing online. This covers the most common items, as there are always new and ever evolving issues to deal with while online. This document will be separated into fundamental categories. Each category then, will have several subsections:
Security on a PC is a combination of the below:
1) External Firewall
2) Wireless Configuration (if you have wireless)
3) Patching your PC
4) Software - Firewalls
5) Software - Antivirus
6) Software - Spyware
7) Local Behaviors
The above categories describe security as it typically occurs in an individuals house. Starting with number 1, the External Firewall, working its way from there into your local PC, and even describing your PC habits, as they typically can be the biggest problem.
Hopefully, after reading this, you will better understanding of security and what is generally good behavior and what may not be.
1 - External Firewall
The outer most part of a home network, is the Digital Modem that attaches to the ISP, thru DSL or a Cable connection. This digital modem basically builds the connection to your ISP.
Before Routers and Firewalls were built, this digital modem was connected to your computer directly. Now, we need to put a Router in between the Modem and your computer. This router, has a built-in firewall that is by far your number one protection from the internet, if I had to say what is the most important at this point, the router/firewall is it.
Hardware Firewalls now today, have NUMEROUS functions that will benefit you, and things you MUST do once you install it.
a) Change the Admin Password
The Administrator account to the router, make sure to change this password IMMEDIATELY, because they all come with the same username and password when you unbox them. Hackers know this and try to exploit that users don't change the password.
b) Turn off UPnP
This is Universal Plug and Play. This is currently not a security flaw, but I see this as being a potential attack vector in the future.
c) Wireless settings
(this will be described in the next section)
d) Disable WAN administration
To configure your router, you have to goto the IP address of the router, and it shows the web interface. Now, in the configuration of the router there is an option to DISABLE accessing the Configuration Screen from the WAN. This means people outside your router (the Internet) are forbidden to access your routers configuration screens, only those on the internet network.
e) Use Network Address Translation
Use NAT (Network Address Translation) on your internal network. I believe most router/firewalls already have this setup. Doing this adds a layer of protection for your computer.
If you want to hear a podcast describing the use of a hardware firewall, and the purpose of NAT, please listen to this Security Now episode that was one of the first, its about a half hour.
Speaking strictly for myself, I use a Linksys Router with a 4 port switch and Wireless. The link to the router in particular is:
http://www.linksys.com The Wireless Router I use is - WRT54G
Just a few of the most common companies that produce routers are NetGear and DLink as well.
Why should you have a router?
I will clarify this for those users that have DSL or Cable Modems, and not really get into Dialup. When a user has DSL or Cable, they connect their computer via a Crossover RJ-45 cable to the DSL or Cable Modem. This modem communicates with the provider of your Internet Service. The IP you get, is what I call a "LIVE" IP. This means you are directly located on the Internet with no hardware borders separating you from the "LIVE" Internet. This in an ideal world would not be a problem.
But we dont live in this idea world. When you are on the LIVE internet your PC is able to be "touched" by other computers on the net. This is generally a very bad thing. For example, if a virus was active in the "Wild" then your IP address is accessible. This means, the virus can try to access your computer with your IP address and try to infect it. Hackers can do the same.
These are easilly installed and getting running can take about 20 minutes to get setup properly.
This router/firewall is configured by default to block all incoming connections. This is basically where the vulnerability is for a PC, block all unknown connections.
Great Links:
Security Now Podcast - Episode 003 - http://aolradio.podcast.aol.com/sn/SN-003.mp3
2 - Wireless Configuration
Assuming you have Wireless, read this, if you dont, go onto the next section named Patching.
Now, Wireless Configuration is a wonderful thing. I will give you some guidance on this. Assuming your PC and your new wireless router have the same type of wireless, then you are ready to go.
Here are the things that you need to do, once you install your Wireless Network Router:
a) DO NOT USE WEP
WEP (Wireless Encryption Protocol) is what was a good encryption scheme implemented badly. Its easy to crack. Do not use this unless you honestly, have no other choice.
b) Do NOT ONLY use MAC Filtering
Before I start, I want to clarify that MAC filtering is not to be used as your ONLY level of security on your wireless network. MAC Filtering should be used in addition to WPA (listed in the next option) as your encryption. If you use wireless encryption, MAC Filtering is not needed, but just adding another level of security.
Let me explain MAC filtering. Every network card in the world, wired and wireless, has a completely unique address hard coded into it. This is called the MAC address. In a wireless environment, theoretically you could use your router to not allow ANY MAC addresses but those you configure in the router, but unfortunately, this is easy to bypass. If someone wanted to access your network, all they have to do, is know a MAC address that DOES have access your network. They simply need to be physically located near your wireless router (outside in a car at the curb for instance) and start sniffing the air for any data being sent. The hacker can then look in this data and actually pull a MAC address from this data. Using another program to spoof his MAC address, he could then access your network. This is why MAC Filtering as your only level of Wireless Security is not advisable.
c) Use WPA
WPA is an acronym for Wi-Fi Protected Access. This is very powerful encryption protocol for your wireless connection. This means, if you set this up, someone seeing the wireless data in the air, would see data that is completely encrypted and unreadable.
When setting up WPA, make sure to use a password (or also named KEY) of at least 20 characters.
d)Turn off Wireless Administrator Privledges
Set your router to NOT allow Wireless connections to manage (making configuration changes) your wireless router. This is very important. If someone was driving by and did gain access to your network, they couldn't access your router, only someone WIRED to the switch where your router is can connect to the router admin panel and make changes.
You need to setup some sort of Wireless Encryption on your wireless network to protect yourself.
Remember, if you have a NON-Encrypted wireless network, someone can logon to your network and perform illegal activities, and since they are on your network, the authorities will come to you. This ALONE is incentive to do this.
Great Links:
Security Now Podcast - Episode 010 - http://aolradio.podcast.aol.com/sn/SN-010.mp3
Security Now Podcast - Episode 011 - http://aolradio.podcast.aol.com/sn/SN-011.mp3
3 - Patching
Every complex software application has bugs in it. This goes for Operating Systems also. Millions of copies of Microsoft's Windows operating system have been sold and are in use by home users and by corporations. Eventually bugs are found that lead to security breaches. To solve this, Microsoft releases patches to the operating system to patch security holes in the operating system. They do this on the Second Tuesday of each month. This is called Patch Tuesday.
That being said, I would suggest that you setup Microsoft's automated system to download the patches or you manually goto their windowsupdate website to download the patches manually.
I cannot stress how important this is. These holes are what virus writers and spyware makers use to compromise your system. This is so important, most corporations have groups of individuals that investigate these patches each month and are in charge or pushing them out to the users desktops and servers throughout the month.
Great Links:
Microsoft's Windows Update http://windowsupdate.microsoft.com