0% found this document useful (0 votes)
105 views35 pages

Securing Your Home Network Essentials

This document provides information on personal cybersecurity. It discusses topics like social engineering, pseudo top level domains, hacking medical devices, securing your home network, using a VPN, backing up data, updating software and devices, using strong passwords, multi-factor authentication, password managers, and social media security. The overall message is that individuals need to take proactive steps to protect their data and devices from cyber threats by implementing security best practices.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
105 views35 pages

Securing Your Home Network Essentials

This document provides information on personal cybersecurity. It discusses topics like social engineering, pseudo top level domains, hacking medical devices, securing your home network, using a VPN, backing up data, updating software and devices, using strong passwords, multi-factor authentication, password managers, and social media security. The overall message is that individuals need to take proactive steps to protect their data and devices from cyber threats by implementing security best practices.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 35

Cybersecurity and You

Personal Cybersecurity

2
Social Engineering

https://www.youtube.com/watch?v=LYilP-1TwMg
4
https://www.knowbe4.com/gameover-zeus
Pseudo Top Level Domains

https://tools.ietf.org/html/rfc7686
Hacking Medical Devices

https://www.youtube.com/watch?v=smhPhmNsvVc
Your home and the Internet
“Magical Internet Cloud”

Charter, Spectrum, Verizon, Comcast, AT&T, etc.

A modem is a networking device which handles communication from


your network to the ISP.

A router is a networking device which handles communication devices


on your network and “routes” the data through the modem to the
outside world.

Peripherals that are not (directly) connected to


the network.
9
Your home and the Internet

10
Your home and the Internet

11
Secure your Home Network
1. Open your router interface. Most will have an app for the router
and will only work via wired connection. Make sure you have a
wired connection established before executing the next steps.
2. If you have enabled it or the router allows for a wireless or
remote operation, this needs to be disabled.
3. Next, change your administrator login and password.
• Older models will have admin and password as the default.
• Newer models of some companies come with a unique login
and password already coded into the system. You can leave
this as it is. It’s more random than anything you can come up
with on your own.
4. Stop your router broadcasting its Service Set IDentifier (SSID)—
anything connected to your router will drop offline.
Don’t be surprised if a neighbor or a
5. Change the routers SSID to something that you and your family
neighbor’s kid knocks on your door
can easily remember.
and asks if you’re having internet
6. Change the password for the network. problems. You just took away their
7. Inventory connected devices and reconnect them to the new free internet service.
SSID, you will have to add the network manually.
12
Secure your Home Network
Tips to Secure Your Network Environment
1. Change the login credentials on your modem (if possible) and router

13
Secure your Home Network
2. Create separate guest networks for visitors and children. Use the
built-in Arlo network or create a separate guest network for your IoT
devices

14
Home Network Use

Have a network use policy for your


home (if you can)—Basic rules for
internet use.

Regular and routine backups of data.

15
Don’t remote into your router
Disable your router’s remote login feature

16
Use a VPN, A personal VPN

What is a VPN and how


does it work?
https://www.youtube.com/watch?v
=JbvUhu3V0P8&feature=youtu.be

So what VPN do I use/buy?


https://www.pcmag.com/article2/0,281
7,2403388,00.asp

17
Don’t get hooked…anti-phishing quizzes

PHISHING QUIZ
A fun 3 minute quiz provided by Think you can Outsmart Internet Scammers?
Google: https://phishingquiz.withgoogle.com/ OpenDNS: https://www.opendns.com/phishing-quiz/

18
How to secure your mobile device
• Set PINs and passwords
• Do not modify your smartphone’s security settings
• Backup and secure your data
• Only install apps from trusted sources (Apple Store
or Google Store—no third party apps)
• Understand app, phone and contract permissions
before accepting them
• Install security apps that enable remote location
and wiping
• Accept updates and patches to your smartphone’s
software
• Don’t connect to open Wi-Fi networks without
protection (personal VPN)
• Wipe data on your old phone before you donate,
resell, or recycle it
• Report a stolen smartphone

19
The device isn’t important, Your data is!!!!

Backup Your Data Frequently

Multiple copies Photos:


• Removable Media • Google Photos
(thumbdrive, portable • Amazon Photos
hard drive • Apple iCloud
• Services
• Carbonite Files:
• Crash Plan • Google Drive
• BackBlaze • Microsoft OneDrive
• Mozy

20
Surf Securely
When accessing websites or moving data make sure to use https://
instead of http://
the S literally stands for SECURITY
Not safe Safe
http://surfingsafe.com https://surfingsafely.com
Updates are your friend
Most incidents can be prevented simply by making sure your devices
are running the most current version of their software and firmware.

• Install OS updates and patches

• Update Software
• Office, Adobe, Java

• Update BIOS on motherboard

22
Preventing Malware

• Update OS/Software
• Use newer browsers
Chrome/Firefox/Edge
• Pay attention to hyperlinks and URLs
• Shortened URL
(http://bit.ly/1bdDlXc) = Google
• Use this to check them
• http://checkshorturl.com
• Run and update antivirus software

23
How to Remove Malware

The best way to get rid of malware is to


use a reliable malware removal tool
• Malwarebytes
• Spy-Bot
• Ad-Aware
• Panda Antivirus
• AVG
• Microsoft Security Essentials

24
Firewalls: Your first line of defense

Leave the Firewall Enabled and Configure It Correctly

25
Internet of Things Security

IoT Security
1. Secure the web interface (secure router
and modem)
2. Change the default log-in and password if
possible
3. Privacy concerns (no real way for 100%
privacy other than don’t use it. You bought
the IOT device to make your life easier not
more private)
4. Update the items software and/or firmware

More explanation of IoT Security from a true expert!


https://krebsonsecurity.com/2018/01/some-basic-rules-for-
securing-your-iot-stuff/
26
IoT and Botnets
What Can You Do to Prevent an
IoT Botnet from Spreading?

While DDoS attacks from Mirai botnets can


be mitigated, there’s no way to avoid being
targeted
• Stop using default/generic passwords
• Disable all remote (WAN) access to
your devices
• To verify that your device is not open
to remote access, you can use tools to
scan the following ports: SSH (22),
Telnet (23) and HTTP/HTTPS (80/443)

27
Passwords: Not as secure as you think

USE MULTI-FACTOR
AUTHENTICATION

28
Multi-Factor Authentication

Multi-Factor Authentication is:


• Something you KNOW

• Something you POSSESS

• Something you ARE

26
2-Factor Authentication
• Something you KNOW (Your Password)
• Something you POSSESS (Your Smartphone)

30
Use Strong Passwords
When creating a password utilize the
following pro tips:
• Use “pass phrases” (ex.
M0mIsAlwaysLateFromTheSt0re!)
• 28ish character password
• Don’t reuse same passwords on important
sites: Amazon, Gmail, and your Bank

OR

Need help creating & securely storing passwords.


• Use a Password Manager: Lastpass,
Dashlane, or Keeper
https://www.pcmag.com/article2/0,2817,2407168,00.asp
31
Good Password Manager Capes

Use a Password Manager


• Show duplicate passwords
• Generate random passwords
• Audit password security
• Heavy encryption
• Use across devices
• 2-Factor Authentication

32
Social Media Security

33
How Can You Protect Yourself
and Still be Social?

• Limit the amount of personal information you post


• Remember that the internet is a public resource
• Be wary of strangers
• Be skeptical
• Evaluate your app settings
• Be wary of third-party applications
• Use strong passwords practices
• Check the application privacy policies
• Keep software, particularly your web browser, up to
date
• Use and maintain anti-virus software

LOCK DOWN YOUR FACEBOOK ACCOUNT


https://www.wired.com/story/facebook-privacy-apps-ads-friends-delete-account/

OTHER: Social Media applications have similar settings


34
Personal Cybersecurity

35

You might also like