Вы находитесь на странице: 1из 2

Broadband refers to high-speed network connection Broadband Security Threats Broadband Modem Setup

Always read the manufacturers manual care-


As broadband Internet connection is Always On , fully and follow the guidelines, while setting up
Traditional Internet services are accessed in broadband modem.
it leads to intentional misuse through
dial-on-demand mode, whereas broadband Trojans and backdoors
Insert the power source into the modem and
then plug the other end of it into the wall socket.
Internet is an always-on Denial of Service
Before connecting the modem to the computer,
Intermediary for another attack check for proper functioning of the computer.
connection, therefore security risk is very high
Hidden file extensions While setting up the modem, follow instructions
Chat clients specific to the type & model of the modem.

Without our knowledge, computer can be compro- Packet sniffing In case of signal via cable, connect the modem
with the cable wire provided.
mised and it Default configurations are extremely vulnerable
In case of ethernet, connect the modem to the
can also be used as a launching pad for carrying out ethernet port of the computer.

disrupting activities on other computers In case of USB connection, connect the modem
Types of Broadband Modem after the computer is properly initialised.

Wait until the indicators on the modem are lit.
Wireless Fidelity (Wi-Fi)
Digital Subscriber Line (DSL) Install the modem driver and associated soft-
Asynchronous Digital Subscriber Line (ADSL) ware provided along with the modem.
Very high speed Digital Subscriber Line (VDSL) To initialize the connectivity the proper user cre-

a d b a n d dentials need to be given and response should

Bro
Cable Modem be awaited before use.

t
Satellite

Inter n e Broadband over Powerlines (BPL)


u r i t y Terminal Adapter Modem Guidelines for Securing Broadband In-

Sec Universal Serial Bus (USB)


ternet Access
Dos
aAlways download broadband drivers from th le-
gitimate websites recommended by the manu-
Since broadband Internet is widely used, it is very Anti-socialism groups use unsecured facturer.
Wi-Fi networks to send terror e-mails
important for every citizen to securely configure it aRegularly download the firmware (driver code)

for safe usage Prevent your wireless network to


become such a hot spot by securing it aAlways use the power adapter supplied by the
manufacturer along with the modem.
aIn case of terminal adapter modem make sure aUse effective end point security solution (with anti x Do not Enable SSID Broadcast:
that filter is enabled for broadband lines. To virus, anti spyware, desktop firewall etc) to protect In Wi-Fi networking, wireless access point or
computer/ laptop from broadband Internet secu- router typically broadcasts the network name
filter unnecessary noise generated during the rity threats.
transmission. (SSID) over the air at regular intervals.This fea-
aEnable Firewall on Modem Router as well as ture was designed for businesses as well as to
aChange Default Administrator ( Passwords Computer:
and User names) : access public hotspots. For a home user this fea-
Broadband modem routers contain built-in firewall ture is unnecessary and can be an entry point to
In order to allow only authorized access to
feature, but this option has to be enabled. Comput break into the network.
the equipment, change the default adminstra
-er connected to the broddband modem also needs
tor or admin password of broadband router x Do not Enable Auto-Connect to Open Wi-Fi
to be protected with desktop firewall.
modem, as these details are given by the manu Networks:
facturer which are common to all modems and aTurn off Modems during extended periods of In case if Auto-Connect setting is enabled, com-
can be misused by anyone. puter with Wi-Fi interface can connect automat-
Non-Use: ically without notifying to the user.This may ex-
aAssign Static IP Addresses to Devices: Shutting down a network will certainly prevent pose our computer to security risks.This setting
Most of the home users are allotted dynamic IP outside unauthorized people breaking into the should not be enabled except in specific cases.
addresses, as DHCP technology is easy to setup. network. Since it is very difficult to frequently turn
This may even helps the attackers who can easily on and off the devices, it can be considered during x Do not leave broadband connectivity open
obtain valid address from DHCP pool. Therefore travel or extended offline period. when it is not utilized.
turn off DHCP option in router or access point
and use fixed IP address range. aIn case of USB broadband modem, disconnect and x Never connect to unkown or untrusted network
remove the device after usage. in case of Wi-Fi.
aEnable MAC Address Filtering:
Every device is provided with an unique MAC aInstall broadband Internet bandwidth usage mon-
address. Broadband access points and router & itoring tool.
provide an option for the user to combine the
MAC addresse of the home equipment for ac- aEnable SSH (secure channel) for remote adminis-
cess. This facilitates to allow connections only tration. Points to be remembered
from those devices.

aEnable Wireless Security: aThe setup, configuration and the features may vary
from model to model.
Modem routers support wireless security.User
can select any one protocol and a protection key. Guidelines for securing Broadband aFor more information please refer manufacturers
manual.
The same wireless security protocol and protec- Internet access :
tion key has to be enabled in computer.

aTurn on (Compatible) WPA / WEP Encryption:


Donts
All Wi-Fi enabled modems/router support some x Dont enable the option for remote administration
form of encryption technology, which has to (via Internet), as it is not required for a home user.
be enabled. x Dont enable the option Restore Factory Default Set- Many home computers are victims
aChange the Default SSID (Service Set Identi ting in broadband modem. of cyber criminals
fier): x Dont use connection without a filter for each
All the access points and routers use a network broadband Internet line.
Prevent your computer from becoming
name called SSID. Manfacturer normally ships x Dont tap the line before the splitter (a small dvice a victim by securing it
their products with the same SSID set. As it can that separates phone line from data / PC port).
be misused by the attacker to break into the net x Dont use USB broadband modem with insecure
work / computer, it is neccesary to change the computer/laptop.
default SSID while configuring wireless security.

Вам также может понравиться