0%

Book Description

A straightforward, graphic-based reference for securing your home network 

  • Set up a firewall

  • Secure your wireless network

  • Stop adware and spyware

  • Keep your children safe from online threats

  • Prevent a virus outbreak

  • Avoid Internet scams 

  • Phishing. Malware. Spyware. Trojan horses. Firewalls. Parental controls. If you have a home computer connected to the Internet, you need to understand these security terms. If that connection is high-speed (always on) or you run a wireless network, your need–your vulnerability–is that much greater. Now, with Home Network Security Simplified, you can get illustrated, easy-to-digest information written specifically for your needs.

    For each class of security threat, Home Network Security Simplified provides a tutorial–including tricks and tools that hackers use, a primer on network security design fundamentals, and step-by-step instructions on implementing security solutions. The authors also offer tips for monitoring your network and show what to do in the event of a security breach. Specifically, you will learn how to:

    Home Network Security Simplified features engaging four-color illustrations throughout, as well as informative security tips and pointers to other resources for more advanced information. Use this book to find the peace of mind that comes with knowing that your home network and your information are secure.

    Jim Doherty is the director of marketing and programs with Symbol Technologies’ industry solutions group. Prior to joining Symbol, Jim worked at Cisco Systems, where he led various marketing campaigns for IP telephony and routing and switching solutions. Jim has 17 years of engineering and marketing experience across a broad range of networking and communications technologies. Jim is a coauthor of the Networking Simplified series, including Cisco Networking Simplified, Home Networking Simplified, and Internet Phone Services Simplified. He is also the author of the “Study Notes” section of CCNA Flash Cards and Exam Practice Pack (CCNA Self-Study, Exam #640-801), Second Edition. Jim is a former Marine Corps sergeant; he holds a bachelor’s degree in electrical engineering from N.C. State University and a master’s degree in business administration from Duke University.

    Neil Anderson is the senior manager of enterprise systems engineering at Cisco Systems. Neil has more than 20 years of engineering experience including public telephone systems, mobile phone systems, Internet, and home networking. At Cisco, Neil’s focus is large corporate customers in the areas of routing and switching, wireless, security, and IP communications. Neil is a coauthor of the Networking Simplified series, including Home Networking Simplified and Internet Phone Services Simplified. Neil holds a bachelor’s degree in computer science.

    This book is part of the Networking Technology Series from Cisco Press®, the only authorized publisher for Cisco Systems.

    Table of Contents

    1. Copyright
      1. Dedications
    2. About the Authors
      1. About the Illustrator
      2. About the Technical Reviewers
    3. Acknowledgments
    4. Introduction
      1. Why Do I Even Need Network Security in the First Place?
      2. Threat Categories
        1. Connection-Based Threats
        2. Access-Based Threats
        3. Software-Based Threats
        4. Victim-Enabled Threats
      3. What’s to Come?
      4. Housekeeping Stuff
    5. 1. Tip 1: Use Firewalls
      1. Why Do I Need Firewalls?
      2. How Firewalls Work
        1. Stateful Packet Inspection Firewalls
        2. Personal Software Firewalls
      3. Putting Firewalls to Work
        1. Putting a Firewall Between You and the Internet
          1. Routers with a Built-In Firewall
          2. Dedicated Firewall Devices
        2. Enabling Personal Firewalls on Your Computers
          1. Windows XP Built-In Firewall
          2. ZoneAlarm Personal Software Firewall
          3. Personal Software Firewalls for Purchase
      4. Test Driving Your New Protection
      5. What to Do If You Think You’ve Been Hacked
      6. Sometimes, Firewalls Block the Good Stuff
      7. Summary
      8. Where to Go for More Information
    6. 2. Tip 2: Secure Your Wireless Network
      1. Why Should I Care About Wireless Network Security?
      2. What Do I Do About Wireless Security?
        1. Change Your Password
        2. Do Not Advertise Your Wireless Network
        3. Scramble Your Signal
        4. Disable Ad-Hoc Networking
      3. How to Do It: Securing Your Wireless Network
        1. Change the Router’s Default Password
        2. Stop Advertising Your Wireless Network
        3. Enable Wireless Encryption
          1. Enabling WEP Encryption on the Wireless Router
          2. Enabling WEP Encryption on the Wireless NIC
            1. Enabling WEP Encryption Using the Linksys Utility
            2. Enabling WEP Encryption Using Windows XP
          3. WPA Encryption Example
            1. Troubleshooting Tips: Wireless Encryption
        4. Disable Ad-Hoc Networking
        5. Prevent Unintentional Roaming
      4. Wireless Security Checklist
      5. Summary
      6. Where to Go for More Information
    7. 3. Tip 3: Use Antivirus Protection
      1. What Are Computer Viruses?
        1. Viruses
        2. Worms
        3. Trojan Horses
      2. Commonsense Approach to Computer Viruses
      3. How Antivirus Works
        1. Virus Detection
        2. Virus Prevention
      4. Inoculating Yourself Against Computer Viruses
        1. Turning On Antivirus at Your ISP
        2. Installing Antivirus Software on Your Computers
          1. Scanning Your Computer for Viruses
          2. Blocking New Virus Infections
          3. Enabling Unknown Virus Detection (Heuristics)
          4. Updating Your Virus Signatures
        3. Windows Live OneCare
      5. What to Do If You Think You’ve Been Infected
      6. Summary
      7. Where to Go for More Information
    8. 4. Tip 4: Keep Your Software Updated
      1. Why Software Needs to Be Updated
      2. Updating Your Operating System
        1. Enabling Automatic Updates
        2. Manual Operating System Updates
      3. Updating Your Software Programs
      4. Using Windows Restore Points
        1. Creating a Restore Point
        2. Restoring Your Computer to a Restore Point
      5. What to Do If You Think Your Operating System Has Been Compromised
      6. Summary
      7. Where to Go for More Information
    9. 5. Tip 5: Lock Out Spyware and Adware
      1. What Is Spyware and Adware?
        1. Adware
        2. Spyware
        3. Are Spyware and Adware Viruses?
      2. Preventing Spyware and Adware
        1. Exercising Common Sense
        2. Installing a Popup Blocker
          1. Turning On the Internet Explorer Built-In Popup Blocker
          2. Installing a Third-Party Popup Blocker Program
        3. Installing an Antispyware/Antiadware Program
          1. Free Antispyware/Antiadware Programs
            1. Spybot Search & Destroy
            2. Ad-Aware
          2. Windows Defender
          3. Antispyware/Antiadware in the Security Bundles
      3. What to Do If You Think You’ve Been Infected
        1. Spyware/Adware-Removal Tools
        2. Removing Spyware and Adware Programs Using the Installed Programs List
      4. Summary
      5. Where to Go for More Information
    10. 6. Tip 6: Keep an Eye on Your Kids
      1. What Are the Dangers Your Kids Might Encounter Online?
        1. Pornography
        2. Predators
        3. Gambling
        4. Hacking
        5. Illegal Peer-to-Peer Sharing
      2. Maybe I Should Rethink This Internet Thing
      3. Preparing Kids for Being Online
        1. Establish and Communicate the Internet Usage Policy
        2. Making Kids Aware of Online Dangers
        3. Avoid Giving Out Personal Information Online
      4. Policing Kids Online
        1. Browse in Plain Sight
        2. Monitor and Review Your Kids’ Websites and Blogs
          1. Check Out Your Kids’ Blogs
          2. Review Website History
        3. Using Parental Controls
          1. Parental Controls at Your ISP
          2. Parental Controls at Your Home Network Router
          3. Parental Controls on Your Computers
            1. Security Bundle Option
            2. NetNanny Option
      5. What to Do If You Think Your Child Is Abusing the Rules
        1. Activity Loggers
      6. Summary
      7. Where to Go for More Information
    11. 7. Tip 7: Recognize and Avoid Phishing Scams
      1. How Phishing Scams Work
      2. Tricks of the Trade
      3. How to Avoid Becoming a Victim
      4. What to Do If You Suspect You Are the Target of a Phishing Scam
      5. Summary
      6. Where to Go for More Information
    12. 8. Tip 8: Create Strong Passwords
      1. Anatomy of a Lousy Password
      2. Elements of a Strong Password
      3. How to Create a Strong Password That You Can Remember
      4. Additional Password Tips
      5. Summary
      6. Where to Go for More Information
    13. 9. Tip 9: Back Up Your Files
      1. What Should I Back Up?
      2. Where Do I Back Up To?
      3. How Often Should I Back Up?
      4. Storage Method Overview
        1. Flash Memory
        2. External Hard Drives
        3. Networked Storage
        4. Online Storage
        5. DVD or CD Storage
        6. Summary of Storage Options
      5. Putting It All Together
      6. Using Windows XP Backup
      7. Summary
      8. Where to Go for More Information
    14. 10. Tip 10: Use Common Sense
      1. Urban Legends
      2. E-Mail Stock Tips (Pump-and-Dump Scams)
      3. Work from Home (Pyramid) Schemes
      4. Money-Exchange Schemes
      5. “Hot” Merchandise Scam
      6. What to Do to Protect Yourself
      7. Summary
      8. Where to Go for More Information
    15. 11. “They Couldn’t Hit an Elephant at This Distance”
    16. Glossary
    3.21.248.47