This is my recommended listening list for home network security and public network security (hotels or wifi hotspots)
The bottom line is that at home you should:
1. Use a NAT router to connect to the internet. Make sure all your ports are blocked (default on almost all routers). Use Shields Up at www.grc.com if not sure.
2. Use WPA or WPA2 for wireless encryption. WEP is easily crackable.
3. Be aware that any non SSL traffic at public hot spots can be easily intercepted.
If you prefer to read, transcripts are available at:
http://www.grc.com/securitynow.htm
If you like podcasts, you can subscribe at:
http://leoville.tv/podcasts/sn.xml
HOME NETWORK SECURITY
Episode 3, NAT Routers http://media.grc.com/sn/sn-003.mp3
Episode 11, Bad WiFi Security http://media.grc.com/sn/sn-011.mp3
Episode 13, Unbreakable WiFi Security http://media.grc.com/sn/sn-013.mp3
PUBLIC NETWORK SECURITY
Episode 10, Open Wireless Access Points http://media.grc.com/sn/sn-010.mp3
Episode 27, How Local Area Networks Work http://media.grc.com/sn/sn-027.mp3
Episode 29, Ethernet Insecurity http://media.grc.com/sn/sn-029.mp3
1 comment:
This would be the first step.
IMHO the most important step is securing the client.
In Germany we have a government organization that releases a newsletter (secured with pgp) with all known vulnerabilites and measures that have to be taken to be safe again for the moment. Sometimes I get an newsletter every day ...(reguluar update freqency: Once per week).
I am pretty sure, you have an equivalent in the U.S. as well.
Post a Comment