Security Checklist
Table 13.2 shows a basic checklist you can use to secure your home network system.
Action | Explanation |
---|---|
Use a virus scanner. | An easy way for you to become a victim, even if you have a strong perimeter network, good monitoring capabilities, and updated security patches, is to let a virus enter your network. A virus can use an application such as e-mail to get by your firewall and destroy the network from the inside. |
Use a robust firewall. | A firewall that does not provide robust capabilities and allow you to network your entire home will be limiting and might even be vulnerable to certain attacks. |
Restrict applications. | Don't run an application unless you are familiar with it. You have to be careful of what ... |
Get Privacy Defended: Protecting Yourself Online now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.