Home & Small Office
Featuring 38 Papers as of August 8, 2013
-
Protecting Small Business Banking
Susan Bradley - August 8, 2013
Over the last several years, the use of online banking and other financial transactions have risen dramatically.
-
Small Business: The New Target What can they Do?
Robert Comella - July 5, 2012
When many think of IT security they think about what they see in movies and on TV.
-
A Small Business No Budget Implementation of the SANS 20 Security Controls
Russell Eubanks - August 31, 2011
The SANS 20 Security Controls were developed in 2009 to help businesses large and small embrace a framework that would promote continuous monitoring and increase network awareness (SANS, 2011).
-
A Virtually Secure Browser
Seth Misenar - June 16, 2009
This paper will discuss an increasingly important aspect of information security, the web browser. Sandboxing and application virtualization will be discussed.
-
Design Secure Network Segmentation Approach
Ibrahim Al-Ateeq - October 5, 2005
In this document I will discuss some issues related to security on network and how design a secure network. We will look to network segmentations and how it will help us to identify the network topology.
-
Case Study: Home Network Redesign
Nate Wilson - October 5, 2005
My goal with this practical is to take a fresh look at my network to make it secure, while maintaining functionally and to do so for as little money as possible.
-
Web Browser Insecurity
Paul Asadoorian - June 2, 2005
There has been much debate lately between two different browsers, namely Microsoft's Internet Explorer and the Mozilla Project's Firefox web browser. Security is in the center of this debate, accompanied by features and usability.
-
Free Tools and Tips to Help Secure Your Home PC
John Hochevar - January 17, 2005
This paper will emphasize free software alternatives to combat viruses/Trojans, protect against spyware, provide safe Internet browsing, prevent computer intrusions, and eliminate pop-ups. The software will all be for the Windows OS platform, concentrating on users with Windows XP SP1 and SP2. Each category will discuss the inherit risks and include a few pieces of free software that can help mitigate risks.
-
Why me? Minimizing your Internet Exposure
Kevin Wagner - July 25, 2004
As the Internet community becomes more skilled in their use of attack tools, we are seeing an increase in the number and severity of Internet attacks. Internet neophytes and professionals alike are asking the same question "There are hundreds of thousands of computers on the Internet, why was my computer attacked?"
-
Kids Online Safety Guide 101
Hari Pendyala - July 25, 2004
This research paper will present ways to protect children against the dangers of the Internet by using "Defense-in-Depth" principle.
-
Designing And Implementing An Effective Information Security Program: Protecting The Data Assets Of Individuals, Small And Large Businesses
Lee Kadel - June 9, 2004
Attacks against computers, in both home and business environments, have grown steadily over the past several years.
-
Budget File and System Integrity Verification for Windows
Ditmar DenEngelsen - June 9, 2004
Home users need an additional level of protection because the threats have increased and file and system integrity verification is able provide this.
-
Defence in Depth on the Home Front
Thomas Harbour - October 31, 2003
This paper sets out a defense in depth approach to meet the security needs of the Windows-based home Internet user while maintaining usability.
-
My Home Setup
John Lutheran - October 31, 2003
The author of this paper shares several changes to his home computer configuration after attending a SANS five day training course on security.
-
The Importance of Social Engineering for the Home Internet User
Ron Dean - October 31, 2003
This paper discusses the necessity for educating home Internet users, recommending several areas of improvement that will help home users understand the need for securing their systems.
-
Filtering Routers in a Small Office/Home Office with a Mixed OS Environment
Ricky Smith - October 31, 2003
In this paper the author explores one layer of a multi-layered defense of the internal network of a SOHO user, and how to configure the packet filtering capability of a cable or digital subscriber line (DSL) router for a mixed OS network. This paper is an extension of the work of Rick Thompson [1] and Patrick Harris [2]
-
Layers of Defense for the Small Office and Home Network
Derek Krein - October 31, 2003
This paper addresses the best means of protecting a small office or home network users systems from malicious activity, is called a multi-layered defensive approach.
-
Building a Secure Home Network
Kim Thomas - October 31, 2003
This paper discusses the implementation of a multi-layered secure home network including, virus protection, firewalls, sensitive data, backups, encryption, safe-surfing on the Internet.
-
Securing the Broadband Network
Sushilkumar Nahar - October 31, 2003
This paper addresses combining broadband access technologies with integrated security solutions, so enterprises and service providers can safely and securely capitalize on all of the benefits of the broadband Internet.
-
Home User's PC Security: Threats To Windows Users and Countermeasures To Defend Against These Threats
Roziah Kassim - October 31, 2003
The objective of this paper is to alert home users of the growing number of threats to home PCs and to provide proper countermeasures against these threats.
-
More Secure at home Using Linux
Hans Lie - October 31, 2003
In this paper, the author describes his personal experience of implementing defensive security measures on his home computer network consisting of a mixed platform.
-
ZoneAlarm - A Free Solution for Home Security
Curtis Elliott - October 31, 2003
This paper provides an in-depth look at ZoneAlarm, a power and easy of use, free personal firewall that is designed to guard a home user's PC against the threat of hackers and data thieves.
-
Best Computer Security Practices for Home, Home Office, Small Business, and Telecommuters
Jon Willert - October 31, 2003
In this paper, the author recommends utilizing a multi-layered defense security approach to secure home, home office, small office, and telecommuter computers.
-
Security Problems for Small Companies
Jeremy Klomp - October 31, 2003
This paper discusses the merits of implementing up front security measures and establishing guidelines and policies to deal with security issues as they arise.
-
Responsibilities of the "Small Shop" in a Post 11 Sept World
Forrest Houston - October 31, 2003
This paper provides some direction for crafting an improved security program.
-
Getting the Most Security out of the Linksys Cable/DSL Router
Earl Charnick - October 31, 2003
This paper provides configuration and set up instructions for installing the Linksys(R) EtherFast Cable/DSL Router.
-
Addressing and Implementing Computer Security for a Small Branch Office
Patria Leath - October 31, 2003
This paper will address the security issues faced by a small office accommodating staff reporting to the main location and visitors requiring "computer access".
-
A 6 - Layer Defense for an IT Professional's Home Network
Daniel Crider - October 31, 2003
Penetrating an I.T. professional's home system is even more desirable in the eyes of most hackers.
-
Understanding & Securing Home Windows Networks
Todd Grigsby - October 31, 2003
My goal of this paper is to provide an understanding of today's Internet Service Providers (ISP) offerings and methods in which you can secure your home Microsoft windows networking environment as effective as possible.
-
Sniffing A Cable Modem Network: Possible or Myth?
Dexter Lindstrom - October 31, 2003
This paper focuses primarily on the threat of malicious users sniffing on a cable modem network.
-
Multi-Layered Approach to Small Office Networking
David Taylor - October 31, 2003
This paper will address several areas that small business owners should consider as they deploy and grow their office network.
-
Homeland Security Starts at Home - Security for the Home Computer User
Michelle Johnston - October 31, 2003
This paper will give you an introduction to the topic of home security and outline what steps you need to take to start securing your home computer.
-
Creating a Stable and Secure Connection from a Remote Website to the Inside of a Network
Tom Williams - October 31, 2003
This paper will examine the best way to grant remote access to the network of a very small business for employees who are out of the office on the road.
-
The Consumer Desktop - The Weak Link in Internet Security and Why ISP's Are Uniquely Positio
John Clark - October 31, 2003
This paper demonstrates why consumer desktops are particularly vulnerable to compromise, what options are available today to protect the consumer desktop and why Internet Service Providers (ISP's) are particularly well positioned to improve the security of consumer desktops.
-
SOHO Firewall Savvy
Maureen Lamb - October 31, 2003
This paper will attempt to provide some guidelines for choosing, installing and configuring a firewall for a small office.
-
Defense in Depth and the Home User: Securing the Home PC
Shauna Munson - October 31, 2003
This paper's purpose is to make the home computer user aware of the risks of using an unsecured computer, and to provide a guide in how to secure the home computer by applying various layers of defense to their system.
-
Protection of Customer Data For Home Business
David Davila - October 31, 2003
This report offers advise for those starting a small home business needing to protect customer data from physically or electronic miss use.
-
Home Computer Security Patch Options For Corporate Security Managers.
Timothy Rice - October 31, 2003
This paper provides a discussion on residential users who connect to a corporate LAN via a Virtual Private Network (VPN) tunnel over a residential broadband Internet connection.
Most of the computer security white papers in the Reading Room have been written by students seeking GIAC certification to fulfill part of their certification requirements and are provided by SANS as a resource to benefit the security community at large. SANS attempts to ensure the accuracy of information, but papers are published "as is". Errors or inconsistencies may exist or may be introduced over time as material becomes dated. If you suspect a serious error, please contact webmaster@sans.org.
All papers are copyrighted. No re-posting or distribution of papers is permitted.
Masters This paper was created by a SANS Technology Institute student as part of their Master's curriculum.
