<<

refers to high-speed network connection Broadband Security Threats Broadband Setup • Always read the manufacturer’s manual care- • As broadband connection is “Always On” , fully and follow the guidelines, while setting up broadband modem. Traditional Internet services are accessed in it leads to intentional misuse through “dial-on-demand” mode, whereas broadband • Insert the power source into the modem and  Trojans and backdoors then plug the other end of it into the wall socket.  Denial of Service Internet is an “always-on” • Before connecting the modem to the computer,  Intermediary for another attack check for proper functioning of the computer. connection, therefore security risk is very high  Hidden file extensions • While setting up the modem, follow instructions  Chat clients specific to the type & model of the modem.

Without our knowledge, computer can be compro-  Packet sniffing • In case of signal via cable, connect the modem with the cable wire provided. mised and it • Default configurations are extremely vulnerable • In case of , connect the modem to the can also be used as a launching pad for carrying out ethernet port of the computer.

disrupting activities on other computers • In case of USB connection, connect the modem Types of Broadband Modem after the computer is properly initialised.

• Wait until the indicators on the modem are lit. • Fidelity (Wi-Fi) • Digital Subscriber Line (DSL) • Install the modem driver and associated soft-  Asynchronous Digital Subscriber Line (ADSL) ware provided along with the modem.  Very high speed Digital Subscriber Line (VDSL) • To initialize the connectivity the proper user cre- dentials need to be given and response should • be awaited before use.

Broadband • Satellite • Broadband over Powerlines (BPL)

Internet • Terminal Adapter Modem Guidelines for Securing Broadband In- ternet Access • Universal Serial Bus (USB) Security Do’s aAlways download broadband drivers from th le- gitimate websites recommended by the manu- facturer. Since broadband Internet is widely used, it is very Anti-socialism groups use unsecured important for every citizen to securely configure it Wi-Fi networks to send terror e-mails aRegularly download the firmware (driver code)

for safe usage Prevent your to become such a hot spot by securing it aAlways use the power adapter supplied by the manufacturer along with the modem. aIn case of terminal adapter modem make sure aUse effective end point security solution (with anti x Do not Enable SSID Broadcast: that filter is enabled for broadband lines. To virus, anti spyware, desktop firewall etc) to protect In Wi-Fi networking, wireless access point or computer/ laptop from broadband Internet secu- typically broadcasts the network name filter unnecessary noise generated during the rity threats. transmission. (SSID) over the air at regular intervals.This fea- aEnable Firewall on Modem Router as well as ture was designed for businesses as well as to aChange Default Administrator ( Passwords Computer: and User names) : access public hotspots. For a home user this fea- Broadband modem routers contain built-in firewall In order to allow only authorized access to ture is unnecessary and can be an entry point to feature, but this option has to be enabled. Comput the equipment, change the default adminstra break into the network. -er connected to the broddband modem also needs tor or admin password of broadband router to be protected with desktop firewall. x Do not Enable Auto-Connect to Open Wi-Fi modem, as these details are given by the manu Networks: facturer which are common to all and aTurn off Modems during extended periods of In case if Auto-Connect setting is enabled, com- can be misused by anyone. puter with Wi-Fi interface can connect automat- Non-Use: ically without notifying to the user.This may ex- aAssign Static IP Addresses to Devices: Shutting down a network will certainly prevent pose our computer to security risks.This setting Most of the home users are allotted dynamic IP outside unauthorized people breaking into the should not be enabled except in specific cases. addresses, as DHCP technology is easy to setup. network. Since it is very difficult to frequently turn This may even helps the attackers who can easily on and off the devices, it can be considered during x Do not leave broadband connectivity open obtain valid address from DHCP pool. Therefore travel or extended offline period. when it is not utilized. turn off DHCP option in router or access point and use fixed IP address range. aIn case of USB broadband modem, disconnect and x Never connect to unkown or untrusted network remove the device after usage. in case of Wi-Fi. aEnable MAC Address Filtering: Every device is provided with an unique MAC aInstall broadband Internet usage mon- address. Broadband access points and router & itoring tool. provide an option for the user to combine the MAC addresse of the home equipment for ac- aEnable SSH (secure channel) for remote adminis- cess. This facilitates to allow connections only tration. Points to be remembered from those devices.

aEnable Wireless Security: aThe setup, configuration and the features may vary from model to model. Modem routers support wireless security.User Guidelines for securing Broadband aFor more please refer manufacturer’s can select any one protocol and a protection key. manual. The same wireless security protocol and protec- : tion key has to be enabled in computer. Dont’s aTurn on (Compatible) WPA / WEP Encryption: All Wi-Fi enabled modems/router support some x Don’t enable the option for remote administration form of encryption technology, which has to (via Internet), as it is not required for a home user. be enabled. x Don’t enable the option “Restore Factory Default Set- Many home computers are victims aChange the Default SSID (Service Set Identi ting” in broadband modem. of cyber criminals fier): x Don’t use connection without a filter for each broadband Internet line. All the access points and routers use a network Prevent your computer from becoming name called SSID. Manfacturer normally ships x Don’t tap the line before the splitter (a small dvice a victim by securing it their products with the same SSID set. As it can that separates phone line from data / PC port). be misused by the attacker to break into the net x Don’t use USB broadband modem with insecure work / computer, it is neccesary to change the computer/laptop. default SSID while configuring wireless security.