Chapter 10: How To Secure Your Network?
A wireless network usually needs a connection between an internet access point such as a DSL modem or a cable and a wireless router to send a signal within a fixed range through the air. Any device for being within the range of router can pull the signal present on-air and can use the internet. You will have to take preventive measures so that anyone staying near-by you will not be able to access your internet connection.
Make Your Wireless Network Encrypted
You will have to encrypt or scramble by using different tools so that anyone can’t read it. Presently, most wireless devices are available with a different scheme such as WEP (Wired Equipment Privacy), WPA (Wi-Fi Protected Access) or WPA 2.
WEP:
It is an old method to protect network services. It includes the fir generation equipment wireless networking services. Generally, old routers are supported by WEP.
WPA
: Wi-Fi alliance develops WPA to give more data encryption sophistically than WEP. It involves the TKIP (Temporal Key Integrity Protocol). TKIP has a message integrity check, per-packet mixing function, a rekeying mechanism, and an extended initialization vector. WPA offers supportive use authentication involving 802.1 x and EAP (Extensible Authentication Protocol). It also authenticates each user by considering a central authentication server such as RADIUS.
WPA2
: It involves AES (Advanced Encryption Standard) algorithms and CCMP (Counter Cipher Mode with Block Chaining Message Authentication Code Protocol) replacing TKIP. Generally, the WPA2 system requires a longer password to use network services than WPA. It offers an additional layer of protection and helps to secure public networks potentially. WPA2 is available in two versions such as WPA2-Personal and WPA2-Enterprise. The company’s Wi-Fi system doesn’t use WPA or WPA2-Personal as the difference exists in the shared password. By choosing WPA2-Enterprise, the company can avoid a shared password and can assign specific credentials to each worker and device. It protects a company from being damaged by a departing employee. Privileged accounts of any financial company should be always strengthened by longer as well as a stronger password and it is also essential to change the password frequently.
Your Default Home Network Name Should be changed
By changing the name of the Wi-Fi network of your home, you can make a better-secured network service at home. The malicious attackers will feel difficulties to understand the type of router used by you when you will change Wi-Fi’s default name. If the hackers get information about your router manufacturer’s name, they will be able to detect the vulnerabilities involved within the model of your router. Then, they will try to utilize them.
There are many reasons when people change the default Wi-Fi name and some of these reasons are as follows.
- Sometimes, you and your neighbor can use the same default Wi-Fi’s name and you may confuse about your router and network services. To avoid your confusion, you can change the default name of Wi-Fi.
- It helps to enhance the security of your home network services. By choosing a customer name, you can discourage the network attackers. It will specify that your router is being administered conscientiously using generic defaults. The hackers generally target the weakest network within a residential neighborhood having several home networks.
- It is advantageous to keep your home network services. If anyone wants to use the network by scanning Wi-Fi signals from their mobile devices or phone, they will see SSID staying within the nearby network services.
Access to Your Network should be Limited
If you want to maintain network security, the NAC (Network Access Security) is one of the perfect solutions. Activation of a NAC system depends on that who or what has permission authentically to use the network. When a network follows a NAC system, it will include an access management system and designated identity. There will be a predetermined set of policies and parameters within the network system to allow or prevent the user from network access. There are many reasons for using a NAC system and some of these reasons are as follows.
- It helps to build a network connection for authentication, authorization, and accounting (AAA).
- It includes specific policies to maintain containment and continuity of valuable property.
- It helps to handle assets and identity.
- It controls users, applications of past authentication or device based on their functions.
- It helps the administrators to explain multiple access schemes to govern users as well as devices connected to the network services based on significant conditions such as device type, user profile, and location.
- When the company follows a NAC system on end-user and compute devices, it starts constantly checking and evaluation of the right software application and also about using of an updated version of devices or patching with the management. In case of failure of these requirements, the end-user will not be able to access the network without an appropriate update of devices.
- A NAC system allows the guests only to access the limited area of network services of the company.
- In many industries such as healthcare and manufacturing, there is a great demand for the administrator to get a complete view of the ant device used within the network.
- The NAC system includes the application of security analytics and machine learning to identify malicious behavior that may lead to attacks by hackers or stolen credentials within the network services.
- A NAC system is advantageous to find out all devices connected within the network including fingerprints and profiles related to them. As a result of this, IT administrators get a global view of happenings within the network services.
Your Password Should be Unique
The selection of passwords for network services plays an important role in building network security. The password helps a user to prove his or her authentication for using a computing device within network services. You should follow some key points to set up a password reducing the chances of the hacking network by hackers. Some of these key points are as follows.
- By choosing a long and complex password, you can maintain network security.
- When you choose a long and complex password, it will take more effort and time to guess by the hackers.
- You should select a password including at least ten characters combining with letters, numbers, commas, percentage signs, and so on.
- You should not use the same password to handle different devices as it will be easy to take control of other devices if a hacker can find out the password of one device.
- You should avoid writing down the password as it can create the chances of hacking your password.
- You should not set a password-based on common things such as your last name, your pet’s name, your kid’s name, your hobby, and so on. The reason is that this type of password can be fused by others easily.
Your PC Should Have Antivirus Software
You will get antivirus software to protect your device within the network services. Usually, free antivirus software offers a simple scanning procedure by using the detection of your signature to locate already detected malware. On the other hand, paid antivirus software usually involves heuristic to catch kind of threat by utilizing a genetic signature to detect even new types of existing virus codes through the used files with the virtual atmosphere. It will also help to measure malicious behavior within the network. You can get several types of protections by using antivirus software and some of these protections are as follows.
Protection of Your Network System from Spyware, Viruses, and Trojans
There are so many people who know the term Trojan, but they don’t know how to manage them. Trojans represent a malicious computer program involving deceitful techniques to hack the network system. Generally, Trojans spread by using social engineering and it is not easy to identify as they usually look like legitimate software. If you click an email or link attachment an assumed source, Trojans will get the chance to unauthorized access your files. Viruses are harmful and they can destroy your system by replicating and infecting multiple programs. It is extremely difficult to identify viruses. You can eliminate efficiently by using special antivirus software. Malware spies are basically structured to take out categorized files which can destroy a business’s integrity.
Protection for File Sharing
Many businesses use USB drives, hard drives and another kind of file sharing device to share their files. External drives are in danger to the virus spreading specifically auto-run viruses and shortcut viruses. Virus protection programs help to prevent any malicious virus causing infection within your network system.
Protection for Email Virus
Email antivirus software intercepts inbounds emails by body, header, and attachment including scanning upon system remain running and startup. Antivirus can identify any suspicious by analyzing independent email components for encrypted files and dangerous objects so that harmful viruses can not destroy your business security.
Protection by Making Diagnostic Report
The antivirus software is advantageous to make a performance report of statistically and broken down graphs to understand easily. A thorough diagnosis of network system offers essential configuration of companies including hardware issues, system response time and performance ratings.
Antivirus software ensures your business protection. It helps in real-time scanning for identification of any malicious entity and also removal of suspicious codes.
Turn On the Firewall
A firewall creates a barrier or shield for giving protection to your phone, PC, laptop, or any devices connected with internet services. Firewalls monitor data exchange within your computer, router, and servers to ensure network security. Most devices are featured with a built-in firewall and you will have to know the procedure of setting up for the built-in firewall of the devices. There several benefits for using a firewall and some of these benefits are as follows.
- You can avoid unauthorized remote access to your computer by involving firewalls.
- You can prevent messages linking to unwanted content by using a firewall.
- The firewall provides protection for your personal directories by blocking harmful or unsuitable content.
- The firewall helps to play online games safely.
Generally, four types of firewalls are used and these are:
- Packet Filtering Firewall: It is a basic level of firewall and provides protection for the internal network by creating separation between internal network and external network. You will have to maintain set up involving some values such as IP Protocol ID, Source IP address, IP Options settings, Fragmentation flags, Destination IP Address, ICMP Message type, and so on.
- Application Proxy Firewall: It is considered as the best and a high-quality firewall. It involves seven layers of the protocol to handle the traffic coming from the server.
- Network Address Translation Firewall: The router involves NAT firewall for distributing internet connections to the different devices.
- Circuit Level Gateway Firewall: It actives between the proxy server and the internal user. When any internal client makes a request to the proxy server, it goes by using Circuit Level Gateway Firewall.
Use VPN
VPN (Virtual Private Network) helps to connect your network over an unsecured, public and unencrypted network personally. There specific encryption versions to support VPN tools for providing protection to your data. It gives protection for the data which you send from your mobile device to an internet gateway. It encrypts the user’s web session completely. It provides security for any bank or financial websites. You can get more access to your date by using VPN as it compresses all information to the server before sending you. VPN helps to maintain your privacy as it resists for tracking a person’s identity.
Turn Off the Router When Not in Use
The router has dedicated software and hardware to forward data within the usage of an integrated addressing system. The router helps to build a connection between the two different internet connections to forward information and data. It also allows us to make a flexible cross-network connection and also to build a larger network system. It also comprises of combination including other devices to strengthen the features of a firewall.
There are several advantages to turn off the router when not in use and these advantages are as follows.
-
Improve security:
By powering off your device, you can improve your network security. Wi-Fi war drivers or hackers fail to hack the devices which are offline.
-
Cost-effective:
You can save money by turning down your router, modem, and computers.
-
Surge Protection:
If you unplug a network device, it will provide protection for causing damage by electric power surges. It also protects your device from major power such as lightning.
-
Reduce Wireless Interference:
Sometimes, when major devices are running by using the router, the other devices can be weakened or unusable. But, they can be active when you turn down the router.
The Admin Credentials of Your Router Should be Changed
You can install a Wi-Fi router within your home to get internet access including your family. By using the password of your Wi-Fi connection, anyone can connect their devices to your network service. Your router’s signal is available within a certain limit of the surrounding area of your home. It is difficult to detect who is accessing your network when the password of your Wi-Fi connection gets out within the world. It is essential to implement some changes to protect your network services from intruders, hackers, and snoopers. You will have to control who is accessing your network. By following some important tips, you can maintain your network security and these tips are as follows.
- You should choose a complicated router password. If you share the password of your network service, anyone can enter your network to access it. You can choose a password by selecting letters randomly including numbers and special characters. Fixing a password made by involving 20 characters is an ideal option to maintain your network security.
- You should maintain a limitation for using the password of your network service.
- You can maintain your network security by changing the password frequently.
- You can replace the password of the admin account by choosing random letters and numbers to build the security of your network service.
Turn Off The Plug ‘n Play
The plug ‘n play procedure allows devices to detect the network within your home and connect to the manufacturer for supplies and firmware updates. UPnP (Universal Plug ‘n Play) is an important element to create things related to the internet. It is advantageous to make the smart household appliance. UPnP is also advantageous to make a channel for hacking. UPnP helps to build cooperation between networking supported smart household gadgets and router. The hackers can hack or infect your household devices by including them within botnets which direct the access requests. You should turn off the plug ‘n play when you do not use the devices. As a result of this, you can maintain network security for the devices.
Change Your Default IP Address
An IP address is essential when you connect any device to the internet including the router. The router also has another IP address to connect the devices which use the internet through the router. There are some conditions when changing IP addresses is essential and these conditions are as follows.
- When the user of network services accidentally configures invalid IP address such as the setting of static IP addresses involving the wrong numeric range.
- If you install a new router and reconfigure your home network by using its default IP address range, you will have to change your default IP Address.
There are mainly two types of IP addresses such as static IP address and dynamic address. There are many advantages to static IP addresses. By using a static IP address, your computer can locate the server from anywhere. Moreover, it helps different computers to run different operating systems to access the host systems and to find out the same address every time. You can assign and handle the static IP address easily.
Disable File Sharing on Other Networks
After connecting to the internet using Dial-Up networking, you will be able to share files and printers on the TCP (Transmission Control Protocol) or IP (Internet Protocol) connection to the internet. You can prevent unauthorized access to your printers, files, and network by disabling file sharing. You will not be sure that online sourced files are malware-free. Generally, hackers target file-sharing application and infect them by using malware. When you download these contents, there may be a risk of security. It results in many security breaches if you have not strong protection for security. Sometimes, file sharing interfaces reveal the computer directory of the users without knowing them. As a result of this, hackers can get information for hacking.
There are many techniques for file-sharing and some of the file-sharing techniques are as follows.
- Removal storage media: It involves removable storage devices such as memory sticks, memory cards, optical disks, removable hard disks and so on. A user of removable storage media can share files to another person and the receiver can connect the services to transfer files.
- FTP (File Transfer Protocol): It helps to share files through the internet. All modern operating systems are available including built-in networks. You will have to fix a valid login and password when you will want to access it.
- Peer-to-peer network: It is a very popular way to share files mainly for music and videos. The examples of peer-to-peer software are uTorrent and Bit Torrent.
- Online storage websites or file hosting services: Google Drive and Drop-box are examples of online storage websites or file hosting services. A member can upload documents, photos and so on by using a web browser.
Sometimes, your computer may be infected by malware through a malware-infected system when you connect removable storage media for your computer. If you transfer official files using FTP, your computer data can be exposed and create security risk as FTP doesn’t include encryption for transferring data. Sometimes, when users of file hosting services are not vigilant and they keep confidential data within publicly accessible folders. By disabling file sharing on another network can help you to avoid above mentioned issues or risks.
Disable DHCP
DHCP (Dynamic Host Configuration Protocol) offers automatic, quick and central management for sharing IP addresses within a network service. DHCP helps to configure the default gateway, subnet mask and DNS (Domain Name System) server information on the devices. Usually, in homes or small businesses, the router plays the role of DHCP. When a user requests an IP address through a router, the host allots an available IP address and helps the user to communicate by using network services.
When a device with DHCP server is turned on and communicated to a network with DHCP server, it helps for sending a request to the server named a DHCPDISCOVER request. After receiving the DISCOVER packet, the DHCP server keeps to an IP address to be used by the device. Then, it provides the user the IP address with the DHCP server including DHCPREQUEST to accept it. The server confirms the user for having a specific IP address by sending an ACK (acknowledgment code) and also explains the range of time which the user of the device can use. DHCP helps to manage the network easily. The user of the device can achieve IP address automatically and the user of the can move freely within the network set up facilitated with DHCP.
Upgrade Your Router’s Firmware From Time To Time
Router’s firmware upgrade is essential to upgrade your device’s firmware. An upgrade firmware provides new features and advanced security. There are different types of router, but the upgrading procedure of the router’s firmware is nearly the same. You should always check the user manual available on the manufacturer’s website for specific instructions to upgrade the router according to your device model. Sometimes, router owners have to face threats from malware users or hackers. When any device is created, the design of hardware and its development is the primary phase. The firmware confirms that the hardware components are functioning properly. Generally, the system performance of the device is degraded due to the running of multiple programs through the device at a time. It will also degrade the speed of operation and people think to replace the worn-out hardware component by using new parts. Upgrade of router’s firmware helps to speed up the device performance.
If you want to upgrade the router’s firmware, you will determine the router model. You can check the manufacturer’s website by using the model number of your router to get the available procedure to update the router. Generally, the update of the router is downloaded by using the router’s admin panel. If you can download the updates firmware file, you will download it and save it within your desktop. Otherwise, you will have to use the admin panel to update the router from your computer. You will also have to know your router’s IP address. Sometimes, the routers have an automatic firmware update.
Amped wireless router is one of the most favorite routers for gamers. You can update the amped wireless router’s firmware conveniently. You can visit the support section for an amped wireless website to update the firmware of the amped wireless router. By clicking on the drop-down menu, you will have to select the model number of your router. Then, click on the download option and select firmware. You can choose the Linksys router or TP-Link router which involves update firmware automatically.