Cyber & IT Supervisory Forum - Additional Resources

TLP:GREEN

14.1.2 Home Wireless Network Security Home wireless networks enable computers and mobile devices to share one broadband connection to the internet without having to use up minutes on cellular data plans. 328 But like all other wireless network technologies, home wireless networks present vulnerabilities that could be exploited by hackers. 329 To help protect your home wireless network from unwanted users, consider the following steps:  Change the network's default network name, also known as its service, set identifier or "SSID." When a computer with a wireless connection search for and displays the wireless networks nearby, it lists each network that publicly broadcasts its SSID. Manufacturers usually give all their wireless routers a default SSID, which is often the company's name. For added security, choose a unique and hard to guess name as your SSID. 330  Change the network's default password. Most wireless routers come with preset passwords for administering a device's settings (this is different from the password used to access the wireless network itself). Unauthorized users may be familiar with the default passwords, so it is important to change the router device's password as soon as it is installed. Longer passwords made up of a combination of letters, numbers and symbols are more secure. 331  Consider using the Media Access Control, or "MAC," address filter in your wireless router. Every device that can connect to a Wi-Fi network has a unique ID called the "physical address" or "MAC" address. Wireless routers can screen the MAC addresses of all devices that connect to them, and users can set their wireless network to accept connections only from devices with MAC addresses that the router will recognize. To create another obstacle to unauthorized access, consider activating your wireless router's MAC address filter to include your devices only. 332  Turn off your wireless router when it will not be in use for any extended period. 333  Use anti-virus and anti-spyware software on your computer and use similar apps on your devices that access your wireless network. To keep your wireless communication confidential, ensure your personal or ISP-provided WAP is using Wi-Fi Protected Access 2 (WPA2). When configuring WPA2, use a strong passphrase of 20 characters or more. 334  Most computers and mobile devices should now support WPA2. When finding a suitable replacement, ensure the device is WPA2-Personal certified. 335  Change the default SSID to something unique. Do not hide the SSID as this adds no other security to the wireless network and may cause compatibility issues. 336 14.1.2.1 Implement WPA2 On The Wireless Network  14.1.3 Wi-Fi Tracking Opt Out Wi-Fi location tracking is a geolocation system that uses the entire Wi-Fi infrastructure (phones, tablets, laptops, and routers) as Wi- Fi access points to find a device’s location. Even when a user is not connected to a router, their device is still sending and receiving data to discover nearby routers, so the devices are still in constant communication if the user has Wi-Fi enabled. 337

TLP:GREEN

Made with FlippingBook Annual report maker