Jan. 27, 2018
What are some ways I can protect my home network from malware, viruses, and hackers?
Use and updated virus protection software
Install antivirus software on all Internet-connected computers and be sure to keep it up-to-date. Many antivirus packages support automatic updates of virus definitions.
Use a firewall
Use a firewall product such as a network appliance or a personal firewall software package. Intruders constantly scan home user systems for vulnerabilities. Network firewalls, whether software or hardware-based, can provide some degree of protection, but no firewall can detect or stop all attacks, so it's not sufficient to simply install a firewall and ignore all other security measures.
Don't open unknown email attachments
Before opening any email attachments, be sure you know the source of the attachment. It’s not enough to know that the mail originated from an address you recognize; the “Melissa” virus spread precisely because it originated from a familiar address. Malicious code can be distributed in amusing or enticing programs. If you must open an attachment before you can verify the source:
1.Be sure your virus definitions are up to date.
2.Save the file to your hard disk.
3.Scan the file using your antivirus software.
4.Open the file.
For more protection, disconnect your computer's network connection before opening the file.
Following these steps will reduce, but not eliminate, the chance that malicious code contained in the attachment might spread from your computer to others.
Don't run programs of unknown origin
Never run a program unless you know it was authored by a person or company you trust. Don't send programs of unknown origin to your friends or coworkers simply because they are amusing as they might contain viruses.
Disable hidden filename extensions
Windows operating systems contain an option to "Hide file extensions for known file types." The option is enabled by default, but you can disable this option to have file extensions displayed by Windows. After disabling this option, there are still some file extensions that, by default, will remain hidden.
There is a registry value which, if set, will cause Windows to hide certain file extensions regardless of user configuration choices elsewhere in the operating system. The "NeverShowExt" registry value is used to hide the extensions for basic Windows file types. For example, the ".LNK" extension associated with Windows shortcuts remains hidden even after a user has turned off the option to hide extensions.
Specific instructions for disabling hidden file name extensions are given in http://www.cert.org/incident_notes/IN-2000-07.html.
Keep all applications patched, including operating systems
Vendors usually release patches for their software when a vulnerability has been discovered. Most product documentation offers a method to get updates and patches. You should be able to get updates from the vendor's website. Read the manuals or browse the vendor's website for more information.
Some applications will automatically check for available updates, and many vendors offer automatic notification of updates. The vendor's website may have information about automatic notification. If no mailing list or other automated notification is offered, you may need to check periodically for updates.
Turn off your computer or disconnect from the network when not in use
Turn off your computer or disconnect its Ethernet interface when you are not using it. An intruder cannot attack your computer if it is powered off or completely disconnected from the network.
More information regarding the risks posed by malicious code in web links can be found in CA-2000-02 Malicious HTML Tags Embedded in Client Web Requests.
Disable scripting features in email programs
Make regular backups of critical data
Keep a copy of important files on removable media such as CDs or DVDs. Use software backup tools if available, and store the backup disks away from the computer.
Make a boot disk
To aid in recovering from a security breach or hard disk failure, create a boot disk before you have a security event, to help recover your computer after an event has occurred.
Army Cyber on U.S. Army website
1st IO Command
780th MI Brigade (Cyber)
Cyber Protection Brigade
Department of Defense
U.S. Cyber Command
Air Forces Cyber
U.S. Fleet Cyber
Marine Corps Forces Cyber
Coast Guard Cyber
U.S. Army Reserve
Army National Guard
U.S. Army Cyber Center of Excellence
Developing tomorrow’s cyberspace strategies today.
Army Cyber School (CAC only)
Army Cyber Institute
National Defense University College of Information and Cyberspace
Air Force Institute of Technology
Defense Cyber Investigations Training Academy
Hacking for Defense