Home Computer Security -- Hardware Security
http://edu-observatory.org/olli/HCS/Week3.html


WE ARE THE WEAKEST LINK
WE ARE A CLEAR AND PRESENT DANGER


  Cellular Carriers/Internet Service Providers (ISPs) provide
  internet connectivity to Mobile Devices, such as Phones,
  Tablets and Hotspots (MiFi). These connections are SECURE.

  ISPs also provide connectivity to one's Local Area Network
  (LAN) via a gateway in the form of a Modem/Router.

NAT Router
  https://www.grc.com/nat/nat.htm

  


Home Router Security
  https://www.us-cert.gov/sites/default/files/publications/HomeRouterSecurity2011.pdf  

  Home routers have become an integral part of our modern
  society as our use of the internet has grown to include
  business from home, schoolwork, social networking,
  entertainment and personal financial management. Wired and
  now wireless routers have moved into our homes to facilitate
  this additional connectivity. Unfortunately, the default
  configuration of most home routers offer little security and
  leave home networks vulnerable to attack. Furthermore, one
  needs to check if the router firmware is up to date.


Secure Configurations for Network Devices such as Firewalls,
Routers, and Switches
  https://isc.sans.edu/forums/diary/Critical+Control+4+Secure+Configurations+for+Network+Devices+such+as+Firewalls+Routers+and+Switches/11746

Printer Insecurity: Is it Really an Issue?
  http://www.sans.org/reading-room/whitepapers/threats/printer-insecurity-issue-1149

  While much attention has been focused on computer security,
  there has generally been very little attention given to
  printer security.

Securing Your Home Network
  https://www.us-cert.gov/ncas/tips/ST15-002
  
OUCH! -- Securing Your Home Network
  https://www.securingthehuman.org/newsletters/ouch/issues/OUCH-201401_en.pdf

  

  
  


Physical Security
  http://www.us-cert.gov/ncas/tips/ST04-017
  http://www.us-cert.gov/sites/default/files/publications/RisksOfPortableDevices.pdf

Three Simple Steps to Securing Your Home Smart Devices
  https://securingthehuman.sans.org/blog/2016/10/26/three-simple-steps-to-securing-your-smart-technologies#  

OUCH! -- Disposing of Your Mobile Device
  https://www.securingthehuman.org/newsletters/ouch/issues/OUCH-201406_en.pdf

Do not plug an unknown USB drive (or Cable) into your
computer!
  http://www.us-cert.gov/ncas/tips/ST08-001
  http://www.macobserver.com/tmo/article/badusb-undetectable-usb-flaw-could-expose-all-your-tech-gear-to-hackers



Security News
  http://edu-observatory.org/media/Security_Media/index.html
Down
  http://edu-observatory.org/media/Down/index.html
Analysis Tools
  http://edu-observatory.org/olli/HCS/tools.html
    


Learning Home Computer Security is not sufficient -- One has
to commit the knowledge to practice.


 
    sam.wormley@gmail.com