Friday, July 19, 2013

When you want to use public wireless services

                          

    TIPS ON INTERNET SURFING VIA PUBLIC  WIRELESS SERVICES


            





Once you have a wireless device such as a notebook computer or a hand-held device connected to public wireless hotspots, you are exposing yourself to potential attacks from remote attackers. Nonetheless, the following security tips may prevent you from falling into the traps laid by attackers:


1. Don’t leave your wireless device unattended
2. Protect Your Device With Passwords: Enable your device’s power-on login, system login authentication, and password-protected screen saver.
3. Disable Wireless Connection When It Is Not In Use: Wi-Fi, infrared, and Bluetooth devices are constantly announcing their presence if they are enabled.

That means they are waving hands to attackers, even though you may be unaware of it.
4. Keep Your Wireless Network Interface Card Drivers Up-to-date: A network interface card driver is just a piece of software. It is not immune to software bugs. Keeping the drivers up-to-date assures that wireless devices have the latest protection and support from product vendors.
5. Protect your device with anti-virus software using the latest virus definitions: This can minimise the risk of infection by computer viruses or spyware.
6. Encrypt Sensitive / Personal Data on the Device: Even when an unauthorised user gains access to your device, encryption will keep your data away from an opportunistic thief.

7. Turn off Resource Sharing Protocols for Your Wireless Interface Card: When you share files and folders, your shared resources may attract attackers attempting to manipulate them.
8. Remove Your Preferred Network List When Using Public Wireless Service: Some operating systems offer a feature for you to build your own list of preferred wireless networks. Once you have this list defined, your system will keep searching for a preferred network and try to connect to the preferred network automatically. By capturing this information sent out from your system, an attacker could set up a fake wireless access point, which meets the settings of a wireless network on your Preferred Network List. In doing so, your device would automatically connect to the attacker’s fake wireless network.
9. Turn off Ad-Hoc Mode Networking: “Ad-hoc” mode networking enables your wireless device to communicate with other computers or devices through a wireless connection directly with minimal security against unauthorised incoming connections. This should be disabled to prevent attackers from easily gaining access to information and resources on your device.

10. Do Not Enable Both Wireless and Wired Network Interface Cards at the Same Time: When a device is connected to a wired LAN with the wireless network interface card still enabled, there is a possibility that attackers can sneak into the wired LAN through an open wireless network if network bridging is enabled.
11. Check the Authenticity of a Captive Portal: Captive portal web pages are commonly used in public hotspots as a means of user authentication and for deterrent protection. When connecting to a public hotspot, the user will be redirected to a captive portal page. However, attackers could also set up fake captive portals to harvest personal information. Therefore, when using public hotspots, it is important to check the authenticity of a captive portal by verifying the server certificate from the website.
12. Don’t Send Sensitive / Personal Information When Using Public Wireless Networks: Public wireless networks are generally considered to be insecure. You should not transmit sensitive or personal information over a public hotspot without proper security controls.
13. Encrypt Your Wireless Traffic Using a Virtual Private Network (VPN): If transmission of sensitive or personal information over a public wireless network is unavoidable, a VPN solution can help ensure the confidentiality of communications using cryptographic technologies.
14. Disable Split Tunnelling When Using VPN: It is possible to connect to the Internet or other insecure networks while at the same time holding a VPN connection to a private network using split tunnelling, but this may pose a risk to the connecting private network.

No comments:

Post a Comment