We use computers in innumerable sectors be it education, banking, investment, telecom, defense or simply in our home. Although the security of data is very important for all those business sector you may not like it if any stranger reads your e-mail while you are communicating with others via e-mail or chat programs, send you a spam, attack other computers using your account, send forged email from your computer, or examine the personal information (such as financial statements) you have stored on your computer. So the security of data is important for the home network as well.
Fortunately there are measures you can take to prevent intruders from accessing your home network by following these steps.
Step1: Always use the latest operating systems and other software that include anti-virus, anti-spyware, anti-phishing, anti-spam and firewall. Newer versions are generally more capable of handling common viruses and hacking strategies. Besides always install licensed software so that you can download the latest patches and updates as soon they are released.
Step 2: Tell every user to create unique user accounts for his or herself so that nobody can access the information stored by someone else on the computer.
Step 3: You should assign privileges to users according to their roles because employees or part-timers working do not need to access all customer data. They can be given limited access to information.
Step 4: Use password that are not easy to guess or cracked. To be on a safe side passwords should be changed regularly.
Step 5: While you are traveling or will not be using the network for a long periods, you should shut down all hosts and networking devices of your home network.
Step 6: Do not remotely administrate your network or any of its hosts on this network.
Step 7: Make sure to protect your network by a firewall.
Step 8: A router should be used to connect a network to the Internet since all routers contain some form of firewall thereby automatically providing a layer of security to the network. Besides, routers are also useful in sharing one Internet connection among multiple hosts. There are several other features supported by router that are beneficial for wired as well as wireless network. There are different routers for wireless and wired network.
Step 9: MAC addresses, unique identifiers of networking devices should be provided to the routers and access points so that invalid hosts can be differentiated from those forming your home network.
Step 10: Though dynamic IP addresses make things easier they are also an easy target for intruders. So, Instead of using dynamic IP addresses use static IP addresses for your home network hosts.
Step 11: You should Use devices that are supported by at least WPE for a wireless network because WPE is a data security protocol especially designed to protect wireless networks. Another version of WPA is WPA2 which provides enhanced security to the wireless network. You can achieve the same levels of data security by using equipment which conforms to the same security protocol.