Chapter 5
Protecting Your Home Network

When you are at home or work, the network itself is your first line of defense against attack by hackers, malware, or other attacks. In the past, a home computer network might consist of one or two personal computers connected to the home router by a physical cable. As shown in Figure 5.1, today, a home computer network may consist of a dozen or more internet of things (IoT) devices all connected to the home computer network wirelessly and providing for streaming TV (e.g., Netflix, Amazon on Demand, Hulu), automated door locks, physical security monitoring systems, climate control, refrigerator monitoring, home health, and other functions.

Figure 5.1: Home computer networks are increasingly capable and correspondingly complex.

Your home network gives you a safe place to connect devices, surf the web, read documents, and conduct commerce. But a home network is not impregnable. Vulnerabilities, compromised devices, and irresponsible behavior can all neutralize the protection of the home network.

This chapter describes a home networking environment, and how you can configure it for security against attack, inside and out. Some of this chapter may be somewhat technical as we have chosen to be comprehensive. By reading through it, you can understand the issues and options you have relating to your home network cyber defense.

Checking Your Network Modem, Router, and Firewall

Home networks typically consist of a high-speed wired connection to the internet, and then components plugged into that connection. Not all environments have all these components, and some environments may have significantly more components. Typical wired internet connections use optical fiber, coaxial cable, or telephone wires. Wireless connections are also available, using satellite or cellular technology. These connections terminate in one or more devices that act as modems, routers, and/or firewalls for the network. They often also include Wi-Fi capability.

Your home network is typically set up for you by your internet service provider (ISP) as part of establishing service. While you should not have to second-guess the ISP’s work, going into the configuration of these devices may give you access to additional security capabilities, while also introducing the risk of misconfiguring those capabilities. Use caution changing these settings unless you really know what you are doing.

To check your network modem, router, and firewall, you should consider the following:

Check your devices for vulnerabilities. Know the manufacturer and model numbers of your network connection devices, and search the internet to see if they have been discontinued, found to be vulnerable, or otherwise compromised. If internet commentary indicates they are “unsafe” you may be able to contact your ISP and ask for an update or a replacement. If you can update the firmware to your device, make sure the firmware is up-to-date.

Disable remote administration. Network modems and routers frequently allow remote administration from the internet, protected by a username and password. First, make sure that remote administration is disabled, unless you have a significant need for it (or really trust your ISP). Remote management is often turned off by default, but discuss remote management options with your ISP if you need them. If remote management is enabled, make sure it is protected by a username and strong password that you create. A default username and password such as “admin” and “password” should be changed, unless there is a compelling reason to leave them alone.

Be aware of network address translation. Network address translation, (NAT) is your primary line of defense protecting your home network. NAT configures your home’s local area network (LAN) to use “private” network addresses that do not work across the internet’s public wide area network (WAN). Your computers and devices on your home network use the private addresses internally to protect against external attacks from the internet. NAT also enables a device, such as a router, to translate the private addresses to public addresses so you can communicate between your home network and the internet. ISPs generally enable NAT for home networks by default; contact your ISP if you have questions or concerns.

Configure network firewalls. Similarly, your router’s firewall should also be enabled by default. The firewall means your router will not respond if it is probed by the internet, except when those probes match certain allowed ports, protocols, or other patterns. The firewall may also provide additional protection like filtering what protocols can connect to the internet, and allowing or blocking certain remote internet addresses.

Check wireless networking or Wi-Fi configuration. If your devices provide you with a home Wi-Fi hotspot (most do), check that configuration as well. More on this topic in the next section.

Do not allow remote access. Many home routers allow remote access, so you can connect to your home network while you are on travel. While powerful, these features are easy to mis-configure to allow your home network to be “wide open” to attack. Be cautious if you choose to use these features.

Securing Your Wi-Fi Configuration

Wi-Fi has been through several revisions over the years, generally indicated by letters—A, B, G, N, and AC—and has steadily increased speed and bandwidth with each subsequent revision. Because of its popularity, Wi-Fi has been thoroughly tested for security, and is generally robust when configured properly. However, some would argue that most of its security comes from its short range, since attackers must be within a hundred feet or so to connect. Just as your neighborhood provides a lot of the security protecting your home, the Wi-Fi short-range capability limits the number of people who might attack it. However, the short-range capability does not make Wi-Fi immune to attack.

Unlike many internet technologies, the Wi-Fi protocols have not been so seriously compromised that older networking devices are completely unsafe. However, vulnerabilities have been found over the years, and many devices run versions of the Wi-Fi protocols that may be targeted and attacked. Successful attack against your Wi-Fi network may mean attackers get a copy of your wireless logon password, can join your wireless network, or can “sniff” wireless traffic between wireless devices and the network. This traffic can also include other logons and passwords, if those are sent in the clear and not protected separately by their own encryption.

To secure your Wi-Fi configuration, and if you are technically able to do so, you should consider the following:

Become familiar with your Wi-Fi router’s administrative console. To check to see who is accessing your Wi-Fi you need to log into the router’s administrative console. If you have not already logged into your console, you will need to get your router’s IP address.

  1. For Windows, enter “cmd” in the Start menu on your desktop and then type “ipconfig” in the Command Prompt window that appears.
  2. Find the listing for the “Default Gateway” IP address. Frequently, it is “192.168.0.1” or “192.168.1.1” but it may be something else entirely.
  3. In your web browser, type in the address “http://<IP address>” where “<IP address>” is the address you looked up in the previous step. If that does not work, try “https://<IP address>.”
  4. You should then be prompted for a username and password. Frequently, the username is “admin” and the password is “password” but that may not be the case. The username and password may be printed on a label on the router, or contained in the router’s documentation.
  5. After entering your credentials, look for something like “connected devices” to see what/who is connected to your Wi-Fi router. Look at the connected devices to determine if you recognize the users or devices.
  6. If you think you have unauthorized users, change the Wi-Fi password and let the authorized users know the new password so they can access your network.
  7. Alternatively, you can segment the unrecognized devices away from the main network by following the online instructions.

Check your Wi-Fi protocols. Wi-Fi protocols have held up relatively well over time, but there are revisions to those protocols to correct bugs and improve security. Check your devices (e.g., computers, tablets, smart TVs, and printers) to determine if they support the standards used by your Wi-Fi router. Use the latest Wi-Fi protocol—802.11ac—where practical. Watch out for press coverage indicating that an older protocol is “unsafe.” If an older protocol is thought to be unsafe, consider disabling that protocol. Typically, if you are experiencing “poor” Wi-Fi connectivity or performance and have a combination of both new and old devices, consider upgrading to a new router that supports the latest Wi-Fi standards.

Enable Wi-Fi security. Configure your Wi-Fi with security and encryption enabled, and choose the strongest available encryption. Today, the current encryption is “WPA2” (Wi-Fi Protected Access 2). WPA2 has vulnerabilities that are planned to be addressed in a future “WPA3” standard. When newer security standards come out, consider upgrading to them if possible.

Configure a strong password. Configure a strong, but easy-to-remember, password for your Wi-Fi network. Network-connected devices like game systems, home assistants, or appliances may necessitate a simpler password than you might prefer. Strike a reasonable balance and change the password periodically.

Segment your network. If you have older devices on your network that are not very secure, vulnerable, or require a less-secure Wi-Fi network configurations, consider setting up a separate “segmented” network. Many routers can support multiple Wi-Fi networks or can allow for primary and guest networks. Putting less secure devices onto a separate Wi-Fi network can reduce your risk, without impairing their ability to operate.

Consider what is “in range.” To hack your Wi-Fi, an attacker must be within range of your access point. Typically, this range is less than a hundred feet, but the range depends on several factors. In a residential neighborhood, your range may only extend to the edges of your property, while in an apartment building your range may extend to more than a dozen neighbors. Hackers with directional antennas may be able to connect to your Wi-Fi from a mile away.

Watch out for secondary networks. Some home devices may generate their own Wi-Fi networks, in addition to connecting to your home network. Be careful that these devices are not providing a backdoor into your supposedly secure network. When in doubt, segment these devices away from the main network.

Periodically check your network. Using your Wi-Fi administrative console, you should occasionally check your network to make sure has not been changed without your knowledge. Your console should have a section related to your network protocols and security settings. You should check them to make sure they are still enabled and up-to-date. You should also check with your device manufacturer for updates to its firmware or configuration settings.

Supporting Visitors and Guests

Most of us have house guests who ask to use our Wi-Fi for their computer, phone, gaming console, or smartwatch. But how secure is the device we are letting them connect? Is it free of malware? Is it malicious? Is it connected to other devices? We do not want to be rude, but we also do not know much about these devices we are allowing inside our network. Once they connect to our internal Wi-Fi network, they have unfettered access to everything else on our home network, unless that home network has been segmented for additional protection.

To reduce this risk, most modern Wi-Fi access points include features to establish a “guest network” for just this purpose. You can use your Wi-Fi router’s administrative console to set up a guest network by following the router documentation. Such networks usually provide guests with internet access, while limiting their ability to connect to the rest of the host’s home network. This approach is usually a good balance of functionality with security and eliminates the need to ask your guests awkward questions about their internet surfing habits or computer administration hygiene.

To securely support visitors and guests, you should consider the following:

Enable guest networking. Enable guest networking on your home network. If you have insecure network-connected devices or appliances, you may want to connect them to this network, rather than your regular home network. Check the guest network configuration to make sure it is segregated from your regular home network.

Configure a guest password. Even though it is for guests, and is supposed to be “low security,” configure a password for your guest network. The password does not have to be too high-security but should be enough to prevent casual access to the network without your knowledge or permission.

Periodically check your guest configuration. Periodically check and reset your guest network configuration and change its password. It is okay to ask visitors to setup their devices with a new password if they only come to visit once a year.

Configuring Multimedia and Gaming Consoles

Internet-based multimedia is in the process of totally transforming how we consume content. Modern gaming consoles are another important, interactive, part of this multimedia experience. Streaming “sticks”—like Roku and Amazon Firestick—plug into your smart television so you can watch movies, TV episodes, and other media and are increasing in popularity. A property these devices share is they are basically full-featured computers masquerading as home appliances and provide us with rich two-way functionality through our home high-definition televisions. These devices have the capabilities of a personal computer, but only provide us a reduced interface, few administration tools, heavily concealed operating systems, and often no keyboard for typing cryptic or complex passwords.

These devices are not just about media or games, either. Smart TV’s can let you not only watch content from services like Netflix or Hulu, but also conduct e-commerce using Amazon or eBay. You can store your credit cards for easy online purchases, along with your home shipping information. On gaming consoles, you can establish multiple online identities, and then link those identities to your accounts on PCs and mobile devices, along with payment information for purchasing in-game power-ups and bonus features. There is real commerce taking place on these devices, with real money at stake.

To securely configure multimedia and gaming consoles, you should consider the following:

Retire obsolete devices. As fun as it may be to have an original Xbox on your home network, some of these older devices have been retired for some time. The older devices are no longer supported by the manufacturer and frequently have unpatched vulnerabilities that may be exploited by attackers. Retire your obsolete multimedia or gaming consoles, or at least disable their internet access.

Keep your devices up-to-date. These devices frequently have an auto-update feature, and some of the better ones make sure they are up-to-date before they allow you to use them (although when this feature fails you may be out of luck). Make sure your devices are up-to-date, install all recommended patches, and use caution if you see media coverage of a major vulnerability.

Be aware of what accounts are on your devices. Smart multimedia devices can frequently include more than a dozen different applications with which you can have accounts and relationships. Many of these applications are paid, while others, like e-mail, may be free. Make sure you know which accounts you have on which devices, and whether those accounts include payment information or not.

Pay attention to online gaming. It is easy to set up an online gaming account for your kids and, before you know it, find out you have given them your credit card and free reign to charge to it. Use extreme caution when enabling payment capabilities within online games and educate your kids on your rules regarding making in-game purchases.

Put passwords on your multimedia devices. As inconvenient as more passwords might be, if you are concerned that kids, guests, friends, or service personnel might be abusing your multimedia devices, passwords might be necessary. Use the features built in to your devices to “lock them down” so they can not be abused.

Protecting Home Internet of Things Devices and Smart Locks

As the revolution in network-connected multimedia devices has taken off, cheap computing has made it possible to build internet connectivity and network-connected smarts into more and more home devices. The modern connected home includes internet connections for doorbells, video cameras, baby monitors, alarm systems, thermostats, appliances, solar power, and even power strips. You can remotely unlock your doors, turn off your lights, change the temperature, and charge your Tesla car, all through your mobile phone or remote computer and enabled by your home network. But all this capability comes with risks. While each of these devices is as powerful as a personal computer of a generation ago, they may not be implemented, supported, or secured like one.

Modern internet of things (IoT) devices generally run a “stripped down” operating system, frequently based upon an open-source core like Linux or Android. These operating systems are then embedded into the devices, and may or may not be updatable after the device is shipped. Properties of these devices include: (1) protocols like Thread, ZigBee, Z-Wave, or KNX for communication; (2) smart “hubs” that may control multiple devices and permit you to interact with them; and (3) outside internet services for “anywhere” access to your smart home devices from your PC or smartphone. Some of these capabilities require Wi-Fi connectivity, while others use their own proprietary wireless connections. It all depends, and the details may be very complex.

To protect your home IoT devices and smart locks, you should consider the following:

Inventory your smart devices. Understand the smart devices in your home, and how they connect. Your solar panel system may have its own wireless connection that plugs into your home internet. Think about smart appliances you installed years ago, or your kids’ toys that are network-connected. It is important to know what in your home is “smart,” how those devices connect inside and outside your home.

Know your device protocols. For better or for worse, there are a myriad of home IoT device protocols and interfaces. While many devices use either Wi-Fi or Bluetooth (which are well-known) these communication protocols are hardly the only protocols for IoT connectivity. Understand what protocols your devices use. If those protocols are not mainstream Wi-Fi or Bluetooth, research them to make sure they are secure enough for your purposes.

Watch out for the cloud. Some of the most remarkable smart device capabilities, like voice recognition, rely upon sending everything you say or do to “the cloud” for analysis. This analysis then determines if you are talking to your refrigerator or gesturing to your television, and what the device should do about that behavior. While these capabilities are not entirely bad—there is nothing wrong with your television knowing when you wave at it—it may also involve invading your privacy in ways that you are not quite ready to consider. Read the fine print in your device manual and make your own decision on what is acceptable. A smart TV watching you in the living room might be okay, while the same surveillance in your bedroom might not be okay. In addition, you may also wish to disable automatic content recognition (ACR) features. These smart device features track your personal viewing activity and share it with manufacturers and advertisers, often without your knowledge or consent.

Secure your IoT devices. If you use smart locks from one of the major manufacturers, do some research on those devices to make sure they are secure enough. If you find reputable articles indicating those devices are not safe or secure, consider replacing or upgrading them. Alternatively, if the manufacturer has released an update to improve security, install it. Understand when you embrace the “smart” home, you also incur an obligation to protect the home, as well. You must pay attention to your devices and keep them up-to-date and secure.

Retire insecure devices. Unfortunately, “smart” devices do not have the same life cycles as their non-smart siblings or brethren. While it may be just fine to have a thirty-year-old lock on your front door (provided it has been rekeyed within the past ten years) having a decade-old smart lock is probably not a good idea. If your smart devices are no longer supported, obsolete, or just plain out-of-date, go ahead and let them go.

Manage your IoT risks. On the one hand, the press is going to sensationalize if a researcher finds a way to defeat an internet-connected lock. On the other hand, lock pickers have dozens of ways to defeat the typical home lock’s key and tumblers, and those techniques seldom get any press coverage at all. To say nothing of breaking a window or forcing an entry. Just because your IoT is less than perfect does not mean you should throw it out—just understand the risk and consider that risk alongside the other risks in your life.

Understanding Remote Access and Running Your Own Servers

One of the more advanced features of home networking routers is the ability to allow remote access to your home network. Another advanced feature is the ability to set up your own server for home networking, internet gaming, or other purposes. While it is neat to be able to access your home network and services from everywhere, these capabilities open your home network up to all sorts of advanced attacks from the internet. While we are not going to tell you not to do these things, we recommend extreme caution and careful attention to detail.

Running remote access or your own servers can be very hazardous to your home network and are outside the scope of this book.

If you intend to enable remote access or run your own servers, you should consider the following:

Do your research. Companies spend millions of dollars standing up internet-facing servers, databases, and applications, yet still get hacked. If you intend to enable these services, you need to consider devices, protocols, applications, interfaces, and authentication. A single mistake could be disastrous.

Enable security and encryption. Enable the security features built into your internet-facing services and servers. Security features include encryption capabilities like Secure Sockets Layer (SSL) or Transport Layer Security (TLS)—along with server certificates—that provide communication security over a network. Once you have turned these features on, you will need to consider protocol versions for web browsing, e-mail, and other communications; corresponding vulnerabilities; and appropriate patches to keep them up-to-date and secure on an ongoing basis.

Require authentication. Most likely if you are enabling remote access or running your own servers, they are for a closed community and not the public at large. To enforce this access restriction, you need to set up accounts for your users and authentication for those accounts. You also need to configure your systems to protect against password attacks like rainbow tables and brute force. You may also want to consider employing advanced, multifactor authentication.

Regularly check logs and configurations. When you are internet-facing, you will be scanned daily by attackers using advanced automated tools to try to take over your systems. While these scans themselves are not a big deal, any exploit of your system is. Periodically check your logs and your configurations to make sure your system remains secure and is only being accessed by the expected users. Check your system documentation and the internet for guidance on which logs should be checked and how to check them.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.12.161.77