SAFE NETWORKING FAQ
Here at BTC we aim to help make you and your Internet experience safer. Below is a list of FAQ (frequently asked questions) we receive about networks and how to protect them.
- What are risks to a network?
- When looking at a computer network, there are several types of threats that can exist. Some of these threats can be viruses, spyware, worms and computer hacks. Security threats have become more technical, better organized and harder to detect (Cross, 2012). The good news is that there are steps that can be taken to reduce exposure and damage that can be done by these risks. Many of these steps are listed in the questions and answers below.
- What the risks to a computer connected to a network?
- When a computer is placed on a network there are some security risks that allow the intentional misuse of your computer by intruders from the internet. The most common method used to control a home computer is a program called a Trojan horse. This program installs back door programs such as backorifice, which allow a hacker to control the infected system. Once infected, the hacked system can be used to attack other systems, do cross-site scripting, email spoofing, send email borne viruses, and packet sniffing (US-CERT, 2015).
- What is a hacker?
a. By definition a hacker is a clever programmer. Eric Raymond, compiler of The New Hackerās Dictionary defines a āgood hackā as a clever solution to a programming problem, and āhackingā as the act of doing it (Rouse, 2015). A person who is a good hacker tends to have a strong love and understanding of programming and network security. Hackers are often portrayed (especially in the movies) as someone trying to break into a computer system.
- Why are hackers dangerous?
- Once a hacker has gained access to your system, the malware installed by the hacker transmits personal information without consent. Once a hacker has someoneās information, they can ruin the personās credit, make purchases in their name, sell the information for illicit or illegal purposes or steal their money and open credit and bank accounts in a false name (Webroot, 2015). A hacker could also steal usernames and password to any account.
- Ways to protect a home network?
- The first priority in securing a WiFi is changing the default log-in name and password on the WiFi router and turn on WPA or WPA2 encryption. Install antivirus and keep it up to date. Another way is to stop broadcasting the SSID (service set identifier) to the public. This is set by the manufacturer and is easy to break into. Make sure the computers that attach to the network are up to date with the latest security and software updates, and scan USB and external devices with security software (NSCA, 2015).
- What are some recommendations for a strong password?
- The stronger a password is, the harder it will be for a hacker to gain access to a system. Nearly anywhere a password is created today it requires what is considered a āstrong passwordā. The requirements of a strong password are at least eight characters long, contains a number, a capital letter, a symbol and lower case letters. It is not recommend that you use any part of a personal name, or personally significant information like names of children. If someone must write a password down, be sure to not label it as a password and keep it safe ( Microsoft, 2015)
- What are some ways to protect individual computers?
- Updating the computer operating system regularly is one way to protect the computer being used. It is also advisable to avoid questionable websites. Use good antivirus software and use antispyware protection. There are several freeware versions of this software available. They will be discussed in question 9. When dealing with email, use caution. Do not open emails that look suspicious, delete spam often and try to not open emails from unknown people (Webroot, 2015). It is also important to keep your firewall turned on. This will help protect from hackers gaining access.
- What are some ways to protect mobile devices?
- There are a few specific steps someone could take to protect their mobile devices. First create a strong password and use the auto-lock feature that most phones come with. Make sure to back up the data on the phone regularly and delete any messages with personal information. If you own an apple device, enable data erase by choosing the number of failed attempts to access a phone before wiping. Set up āfind my iPhoneā to help locate the phone if it is lost or remotely wipe it. Turn on the āAsk to Join Networks function also. This will prevent you from joining unsafe networks without being aware. Always make sure to keep the operating systems updated
( Intuit, 2013).
- What are some specific software programs (i.e., Symantec Ā® Antivirus Corporate Protection) to protect computers?
- Advast Free Antivirus is a good free piece of software allows you to set it, and forget about it. It is fast scanning and runs smoothly in the background. Spybot Search & Destroy will become a constant piece of software on your system. It eliminates spyware and tracking cookies. This software also helps keep your machine from getting infected in the first place. CyberGhost VPN is a utility that sets up a virtual private network when you connect to the internet. It helps hide the true IP address of your computer and connects you to anonymous servers. This software in the free version has limits; it times you out after 6 hours and requires you to restart a new session. Also it uses European servers so you may have trouble connecting to the US version of some sites like Google
(Gralla, 2011).
- What are some tips for using free Wi-Fi?
- Pick the free Wi-Fi that is joined carefully. Make sure the network being joined is actually one provided by the location you are in, such as a library or coffee shop. Use long and secure passwords as discussed above to make your system harder to hack. If using a smartphone, set up the phoneās security. Norton and Sophos offer good mobile security and antivirus for smartphones (Farley,
2012).
- Best Practices for using free Wi-Fi?
- When connecting to a free Wi-Fi the user needs to pay attention to a few specific items to keep their system safe. First, check for the āsā at the end of the URL. When you are going to a website, try to use the beginning HTTPS://. Some sites may not support this, but many do. When on a free Wi-Fi, ever download a software package to update any of your applications. This may contain malware to harm the computer being used. Never allow the computer to connect automatically to free Wi-Fis. Also a virtual private network will help keep browsing sessions secure. One other item to check the setting on is turning off file and printer sharing. Check the website you are using for encryption every time you access it (Savvides,
2014).
- What are Personal Hotspots?
- Personal hotspots are devices that are able to share Wi-Fi access to the internet where ever they can receive cellular service. AT-T and Verizon both offer their own version. Personal Wi-Fi hotspots allow you to connect to the internet on a secure known network. Some phones also are able to do this by turning on a feature in the phone.
Personal hotspots can be handy if someone is in a
location where there is no Wi-Fi available, or you are unsure the Wi-Fi provided is safe.
- What is a VPN (Virtual Private Network?)
- A virtual private network is an encrypted network that can be used to connect securely to another network or computer. Through a VPN a computer can connect to and share resources safely. Connecting to a VPN while on a hotspot or free Wi-Fi encrypts your internet traffic stopping people trying to view your browsing or capture your passwords. Many companies use VPNs to allow employees to access remote files and systems (Geier,
2013).
- What is a firewall?
- A firewall is a software program or piece of equipment that blocks hackers. Hackers send out pings to thousands of computers at a time waiting for a response. A firewall prevents your computer from responding. This application or hardware sits at the entry point of the networked system. Firewalls at their most basic level performs packet filtering, meaning they examine the address information and protocol of each packet of information and then follows a set of rules to allow or not allow the information to pass (PC-help.org, 2015).
- What can parents do to protect their children?
- First, make sure your children are aware of how dangerous the internet can be. A familyās privacy needs to be a top priority. For very young children, check your Internet providers parental control software or if there is none, purchase some. By limiting the websites children
can visit, the possibility of downloading viruses and malware decreases. Make sure the childās computer is up to date with antivirus and operating system patches/updates. This too will help keep the system and the network safe. The most important thing a parent can do however is supervising the childās Internet usage.
If you have any further questions, please contact us at technicaladvisor@BTC.com
.
References:
Cross, T., (2012), 5 Key Computer Network Security Challenges For 2013, retrieved from http://www.forbes.com/sites/ciocentral/2012/12/11/5-key-computer-network-security-challenges-for2013/
.
Farley, A., (2012), How to use Wi-Fi Safely While Traveling, retrieved from http://www.travelandleisure.com/articles/how-to-use-wi-fi-safely-while-traveling
.
Gralla, P., (2011), Best Free Software for Protecting Your PC and Your Privacy, retrieved from http://www.pcworld.com/article/237027/best_free_software_for_protecting_your_pc_and_your_privac
y.html.
Grier, E., (2013), How (and why) to set up a VPN today, retrieved from http://www.pcworld.com/article/2030763/how-and-why-to-set-up-a-vpn-today.html
.
Intuit, (2013), Protect Your Mobile Device, retrieved from https://security.intuit.com/protect-yourmobile.html
.
Microsoft, (2015), Tips for creating a strong password, retrieved from http://windows.microsoft.com/enus/windows-vista/tips-for-creating-a-strong-password
.
NSCA, (2015), Securing Your Home Network, retrieved from https://www.staysafeonline.org/stay-safeonline/keep-a-clean-machine/securing-your-home-network
.
PC-Help.org, (2015), What is a firewall?, retrieved from http://www.pchelp.org/www.nwinternet.com/pchelp/security/firewalls.htm
.
Rouse, M., (2015), Hacker Definition, retrieved from http://searchsecurity.techtarget.com/definition/hacker
.
Savvides, L., (2014), Staying safe on public Wi-Fi, retrieved from http://www.cnet.com/how-to/tips-tostay-safe-on-public-wi-fi/
.
US-CERT, (2015), Home Network Security, retrieved from https://www.us-cert.gov/Home-NetworkSecurity#introduction
.
Webroot., (2015)., Computer Hackers and Predators, retrieved from http://www.webroot.com/us/en/home/resources/articles/pc-security/computer-security-threatshackers
.
Powered by TCPDF (www.tcpdf.org)