CERT Coordination Center: Home Network Security
This document gives home users an overview of the security risks and countermeasures associated with Internet connectivity, especially in the context of "always-on" or broadband access services (such as cable modems and DSL). However, much of the content is also relevant to traditional dial-up users (users who connect to the Internet using a modem).

1. Computer security
1. What is computer security?
2. Why should I care about computer security?
3. Who would want to break into my computer at home?
4. How easy is it to break into my computer?
2. Technology
1. What does "broadband" mean?
2. What is cable modem access?
3. What is DSL access?
4. How are broadband services different from traditional dial-up services?
5. How is broadband access different from the network I use at work?
6. What is a protocol?
7. What is IP?
8. What is an IP address?
9. What are static and dynamic addressing?
10. What is NAT?
11. What are TCP and UDP ports?
12. What is a firewall?
13. What does antivirus software do?
3. Computer security risks to home users
1. What is at risk?
2. Intentional misuse of your computer
1. Trojan horse programs
2. Back door and remote administration programs
3. Denial of service
4. Being an intermediary for another attack
5. Unprotected Windows shares
6. Mobile code (Java, JavaScript, and ActiveX)
7. Cross-site scripting
8. Email spoofing
9. Email-borne viruses
10. Hidden file extensions
11. Chat clients
12. Packet sniffing
3. Accidents and other risks
1. Disk failure
2. Power failure and surges
3. Physical theft
4. Actions home users can take to protect their computer systems
1. Consult your system support personnel if you work from home
2. Use virus protection software
3. Use a firewall
4. Don't open unknown email attachments
5. Don't run programs of unknown origin
6. Disable hidden filename extensions
7. Keep all applications (including your operating system) patched
8. Turn off your computer or disconnect from the network when not in use
9. Disable Java, JavaScript, and ActiveX if possible
10. Disable scripting features in email programs
11. Make regular backups of critical data
12. Make a boot disk in case your computer is damaged or compromised

Appendix: References and additional information

Document Revision History
Comments: 0
Votes:29