Security Checklist

Table 13.2 shows a basic checklist you can use to secure your home network system.

Table 13.2. Security Checklist
ActionExplanation
Use a virus scanner.An easy way for you to become a victim, even if you have a strong perimeter network, good monitoring capabilities, and updated security patches, is to let a virus enter your network. A virus can use an application such as e-mail to get by your firewall and destroy the network from the inside.
Use a robust firewall.A firewall that does not provide robust capabilities and allow you to network your entire home will be limiting and might even be vulnerable to certain attacks.
Restrict applications.Don't run an application unless you are familiar with it. You have to be careful of what ...

Get Privacy Defended: Protecting Yourself Online now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.