Setting up a secure network is one thing -- keeping it secure is another. All your hard work will go to waste if you aren't careful about how you use the Internet. But if you follow a few guidelines, you'll greatly reduce your chances of compromising your network's security.
The first tip is to avoid clicking on hyperlinks in e-mail or instant messages, particularly if you don't recognize the name of the person sending it to you. The link may lead you to a site hosting malware. It might even initiate a malware download. Tell your friends and family that you avoid clicking on hyperlinks unless you are sure they lead to a safe destination.
Sometimes links on Web pages can also lead to malware. You might click on a link thinking you're going to one site when you're really going to another. Some malware designers will go so far as to create a copy of a legitimate Web page and use it to host their malware. It's called spoofing. Fortunately, it's not that common -- most legitimate sites are quick to take action when they discover a spoofed version.
If you want to make sure you're visiting the right Web site, you shouldn't rely on hyperlinks at all. The most reliable way to reach the site you want is to type the URL into your browser's address bar. Even this method isn't completely foolproof, but it's the most reliable way to make sure you go to the site you want to visit.
Another thing to watch out for are peer-to-peer services. These services allow you to download files hosted on other users' computers. Most of these services rely on users to share files. Usually, the service will create a shared folder. Any file within that folder is fair game -- other users of the service can download a copy of it. If you aren't careful, you could allow unfettered access to all the files on your computer. If you store any private information on your machine, it might not be private for long.
As long as you're cautious when you set up a peer-to-peer service, you should be fine. Just keep in mind that by the very nature of the service, you'll be compromising your network's security.
It might seem like the tips we've shared in this article are excessive. But think about how important your personal information is to you. If someone else had access to that information, he or she could steal your identity. A malicious hacker could raid a banking account, ruin your credit rating or use your machines to attack a Web server or send out spam. While no network is ever 100 percent immune to attack, following these tips will greatly reduce the risk of a security compromise.
Learn more about computer networks and security below.
Related HowStuffWorks Articles
More Great Links
- Academic Computing. "What to do if your computer is already infected with a virus." University of Minnesota. (March. 26, 2009) http://www1.umn.edu/adcs/guides/security/infection_cleanup.html
- Campus Information Technologies and Educational Services. "Home Wireless Network Security." University of Illinois at Urbana-Champaign. Sept. 2, 2008. (April 7, 2009) http://www.cites.illinois.edu/security/beyondbasics/homewireless.html
- CERT. "Home Network Security." June 22, 2001. Last revised Feb. 27, 2006. (April 6, 2009) http://www.cert.org/tech_tips/home_networks.html
- Dittrich, David. "Lifecycle: Preventing, detecting and removing bots." March 20, 2005. (March 19, 2009) http://searchsecurity.techtarget.com/tip/0,289483,sid14_gci1068906,00.html
- Karygiannis, Tom and Owens, Les. "Wireless Network Security." National Institute of Standards and Technology. November 2002. http://csrc.nist.gov/publications/nistpubs/800-48/NIST_SP_800-48.pdf
- Microsoft. "Improve the security of your wireless home network with Windows XP." May 15, 2007. (April 6, 2009) http://www.microsoft.com/windowsxp/using/networking/security/wireless.mspx