Skip to main content

2023 | OriginalPaper | Buchkapitel

7. Guard the Castle Gate

verfasst von : Carey Parker

Erschienen in: Firewalls Don't Stop Dragons

Verlag: Apress

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this chapter, we’re going to discuss your home network—the main gate for your digital castle. Everything that comes in or goes out of your home network goes through your modem and router. We’ll also discuss some common devices on your network, VPNs, and more.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
Service from your cable company uses technology called Data over Cable Service Interface Specification (DOCSIS); service from the phone company usually uses technology called Digital Subscriber Line (DSL) or Asymmetric DSL (ADSL).
 
2
According to the 2017 American Customer Satisfaction Index (ACSI) survey, cable companies and Internet service providers are tied for last place in the United States, well below even health insurance companies and airlines.
 
3
If you’re interested, networked devices have fixed, preassigned hardware addresses called a media access control address, or MAC address. The initial setup works with these addresses, and then once DHCP happens, the device uses the IP address that the router assigned to it.
 
4
So, the title of this book intentionally plays fast and loose with the meaning of “firewall.” Dragons breath fire, right? But the real point of the title is that if a dragon-level attacker (think CIA, GCHQ, Russia, China) really wants to get into your home network, then common tools like the firewall in your router will not be sufficient defense.
 
5
There is actually a public, free search engine for exposed Internet devices—it’s called Shodan. With this tool, you can search for webcams, baby monitors, video doorbells, and other smart devices that have exposed themselves directly to the Internet, usually through holes poked in a firewall.
 
6
There are plans afoot to address this problem—basically, by creating a smart “hub” at home, which can centralize and standardize control of your IoT devices, with more security and privacy. See this article: https://www.eff.org/deeplinks/2022/06/keeping-your-smart-home-secure-private
 
7
One odd addendum to this… law enforcement agencies have subpoenaed these recordings for criminal investigations.
 
8
HTTP stands for HyperText Transfer Protocol, which is the request and response language that I alluded to earlier in this chapter.
 
9
The VPN market has gotten really slimy. Be very careful choosing your VPN. https://www.consumerreports.org/vpn-services/vpn-testing-poor-privacy-security-hyperbolic-claims-a1103787639/
 
10
Unfortunately, with the US privacy regulations being gutted in 2017, ISPs can legally track everything you do and sell that information to others. In the next chapter, we’ll discuss another way to hide your Internet tracks from your ISP by using secure DNS.
 
Metadaten
Titel
Guard the Castle Gate
verfasst von
Carey Parker
Copyright-Jahr
2023
Verlag
Apress
DOI
https://doi.org/10.1007/978-1-4842-9036-1_7