Network Security guide for the home or small business network – Part 19 – What about when you’re not on your home network?



When you’re not at your home network is probably one of those times you should be more on your guard. Wireless access points are very common and a greatly useful thing, but there are some steps you should take to protect yourself, your pc and the data stored there. First it’s worth having a personal firewall for just this type of situation. You obviously can’t make use of a second hardware firewall when hooking up to a wireless LAN. (Although I would think that a small “wireless bridge” adapter of a wireless device to a wired ethernet port MIGHT be able to serve that function. It depends on how it’s implemented.)


Of course, their network may be protected by a firewall from the internet, but you don’t KNOW their network or who else is on it. A personal firewall is a must for this circumstance. The next thing is this… be more cautious about ways of communicating that use plain text. Anything sent plain text between you and the “destination” can be read as plain text anywhere along the way. Packet sniffers in the wireless network could read everything. So… make sure (this goes for your home network to BTW) everything possible is using encrypted connections if it has to do with passing username/password information or credit card information/etc.

Once upon a time to https:// in the site name was a good indication of a “secure” site, one that supported end to end encryption. Now the “pad lock” icon is a similar indicator. Unfortunately many banks embed that within a non-secure page such that it’s hard to tell by that simple test. Many sites now will go through a secure encrypted mode (usually a tad slower) if you replace http:// with https:// in the address. (Gmail is supposedly one of these for secure webmail login.) If you have to connect to a home network, use some sort of encrypted tunnel like a ssh connection or a VPN connection. That will make it VERY difficult for anyone to eavesdrop.

Think about physical security as well in public. Can someone peek over your shoulders to see your credit card number (or pin number)… can they overhear you on a phone pass along information like that. Are usernames and passwords easily seen/observed? As always try to think like someone would who’s trying to get at information. Be skeptical and observant.

Related Posts

Blog Traffic Exchange Related Posts
  • Network security - what does arp spoofing mean for wireless? So, if you haven't already had enough cause to tighten your wireless security.... we've been talking about arp poisoning (spoofing) and the basic conclusion is that IF an attacking machine is on the same subnet as your machine (same IP address range), they can "own" all traffic from you machine......
  • Network Security guide for the home or small business network - Part 2 - A Software Firewall Do I really need a hardware firewall? I'm running XP Service Pack 2 with the built in firewall? (or norton, or zonealarm?) Well, personal firewalls (the name that software firewalls go by) are good for a great many things that hardware firewalls AREN'T. They do have their limitations though and......
  • More information on Titan Rain ("Hack attacks") Earlier this year there was an article or two about a rumored "hack attack" that was ongoing against US Government (and contractor) computer systems. The stories claimed that the attacks seemed to be coming from China. Today I'm seeing a couple of articles on the topic. First up is an......
Blog Traffic Exchange Related Websites
  • Dolphin Secure document.write(''); Dolphin Secure is the best way for kids to connect, learn, and explore safely online. With this program parents can breathe easier knowing that they control who their children talk to and what websites they are going to. Using one of a kind fingerprint reading technology, kids can......
  • Lorex Security Solutions LOREX is a global leader in video security camera solutions offering exceptional performance with a wide range of products including security cameras, wireless security cameras, ip cameras (network security cameras), security dvrs, observation systems and other complete security systems. LOREX solutions are easy to setup and features plug and......
  • WEP vs WPA Another question I get asked a lot is on Wireless security.  People get very confused by the security options out there, and the industry doesn't help by adding acronym after acronym.  So what do you do?  The answer is fairly simple - secure your network with WPA!! There are lots......
www.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Leave a Reply

You must be logged in to post a comment.


Switch to our mobile site