Universal Plug and Play (UPnP): UPnP allows devices on a home network to automatically discover and connect to each other without the need for manual configuration. However, it can also be a security risk if not properly configured, as it can allow unauthorized access to devices on the network.
Screened subnet: A screened subnet is a network architecture that separates a home network into two or more subnets, with a router acting as a firewall between them. This can be used to improve security by isolating sensitive devices or services from the rest of the network.
Explain the following Wireless specific features
Wireless networks can be secured by configuring the following features:
1. Changing the service set identifier (SSID): The SSID is the name of the wireless network. Changing the SSID makes it more difficult for attackers to identify the network and launch attacks.
2. Disabling SSID broadcast: By default, wireless access points broadcast the SSID. Disabling SSID broadcast prevents the access point from announcing its presence, making it harder for attackers to find the network.
3. Encryption settings: Encryption is used to protect the wireless network from unauthorized access. WPA2 encryption with AES is currently the strongest encryption standard available for wireless networks.
4. Disabling guest access: Disabling guest access prevents unauthorized users from connecting to the network. It is recommended that guest access be disabled unless it is specifically needed.
5. Changing channels: Wireless networks operate on specific channels. Changing the channel can reduce interference from other wireless networks and devices, improving performance and security. It is recommended to use channels 1, 6, or 11 as they do not overlap.
By configuring these settings, users can secure their wireless networks from potential threats and attacks.
Firewall settings
Firewall settings are an important part of network security. They can help block unwanted traffic and keep your network secure. Here are two common firewall settings:
1. Disabling unused ports: Firewalls often have many ports open by default, and some of these ports may not be used or necessary. Disabling these unused ports can help reduce the risk of attack or unauthorized access. For example, if your firewall has a port open for file sharing, but you do not use file sharing, you can disable this port.
2. Port forwarding/mapping: Port forwarding or mapping is the process of forwarding network traffic from one port to another. This is often used to allow remote access to a specific device or service on your network. For example, you may want to set up port forwarding for a video surveillance system so that you can view the footage remotely.
It is important to configure port forwarding carefully to avoid exposing your network to potential security risks. Only open the ports that are necessary for the services you want to use, and use strong passwords for any remote access accounts.
Install and configure browsers and relevant security settings for the following
Browser download/installation
When downloading and installing a browser, it is important to follow some security best practices:
Only download browsers from trusted sources, such as the official website of the browser or a reputable download platform.
Verify the integrity of the download by checking the hash value provided by the download source against the hash value of the file you downloaded. This ensures that the file has not been tampered with or corrupted during the download process.
Avoid downloading and installing browsers from untrusted sources, as they may contain malware or other types of malicious code.
Once the browser is installed, it is important to configure relevant security settings:
Enable pop-up blockers to prevent unwanted pop-ups from appearing on your screen.
Enable privacy settings to prevent the browser from storing your browsing history, cookies, and other personal information.
Enable phishing and malware protection to prevent access to malicious websites and downloads.
Enable automatic updates to ensure that your browser is always up-to-date with the latest security patches and bug fixes.
Disable plugins and extensions that are not needed or that are known to be vulnerable to security threats.
By following these security best practices, you can help protect your computer and personal information while browsing the internet.