CERT Coordination Center: Home Network Security
		
		
		
			
This document gives home users an overview of the security risks and countermeasures associated with Internet connectivity, especially in the context of "always-on" or broadband access services (such as cable modems and DSL). However, much of the content is also relevant to traditional dial-up users (users who connect to the Internet using a modem).
   1. Computer security
         1. What is computer security?
         2. Why should I care about computer security?
         3. Who would want to break into my computer at home?
         4. How easy is it to break into my computer?
   2. Technology
         1. What does "broadband" mean?
         2. What is cable modem access?
         3. What is DSL access?
         4. How are broadband services different from traditional dial-up services?
         5. How is broadband access different from the network I use at work?
         6. What is a protocol?
         7. What is IP?
         8. What is an IP address?
         9. What are static and dynamic addressing?
        10. What is NAT?
        11. What are TCP and UDP ports?
        12. What is a firewall?
        13. What does antivirus software do?
   3. Computer security risks to home users
         1. What is at risk?
         2. Intentional misuse of your computer
               1. Trojan horse programs
               2. Back door and remote administration programs
               3. Denial of service
               4. Being an intermediary for another attack
               5. Unprotected Windows shares
               6. Mobile code (Java, JavaScript, and ActiveX)
               7. Cross-site scripting
               8. Email spoofing
               9. Email-borne viruses
              10. Hidden file extensions
              11. Chat clients
              12. Packet sniffing
         3. Accidents and other risks
               1. Disk failure
               2. Power failure and surges
               3. Physical theft
   4. Actions home users can take to protect their computer systems
         1. Consult your system support personnel if you work from home
         2. Use virus protection software
         3. Use a firewall
         4. Don't open unknown email attachments
         5. Don't run programs of unknown origin
         6. Disable hidden filename extensions
         7. Keep all applications (including your operating system) patched
         8. Turn off your computer or disconnect from the network when not in use
         9. Disable Java, JavaScript, and ActiveX if possible
        10. Disable scripting features in email programs
        11. Make regular backups of critical data
        12. Make a boot disk in case your computer is damaged or compromised
      Appendix: References and additional information
Document Revision History		
		
				


Votes:29