This checklist will help you find and eliminate some insecurities easily, allowing you to concentrate your resources on more difficult problems. Note that being able to tick every item on the checklist does not guarantee security of your information, just as you don't necessarily have a problem just because an item remains un-ticked: the checklist is only a first step but certainly an important one.
If you need more detailed explanation of any items on this checklist, or more information about the implications of your results, contact Mark L Pappin (or on +1 615 422 5657) for a free followup consultation. Mark also provides personalised advice, assistance, and consulting services for $100 per hour.
Note that this checklist is appropriate only for common home or small-business computer networks and equipment. If what you've got doesn't fit here, then you might still get some value from the list, but you don't qualify for the free followup.
In a perfect world, where everyone behaved in a way that benefits others at all times, there would be no need for information security, or for locks on doors either. It's important to keep information secure because of the bad things that can happen if we don't.
Securing information can be thought of as maintaining 3 properties:
information is not disclosed without authority
information is not modified without authority
access to information is not withheld without authority
The common subnet mask of 255.255.255.0 will be used here.
cc can be any value from 0 to 255. Select a value at random from 2 to 254 inclusive.
Most consumer devices use 192.168.0.xx or 192.168.1.xx.
bb can be any value from 16 to 31. Select a value at random.
cc can be any value from 0 to 255. Select a value at random.
aa can be any value from 0 to 255. Select a value at random.
cc can be any value from 0 to 255. Select a value at random.
Each device on the network needs a unique address with xx between 1 and 254 inclusive. A common convention is to use either the first or last valid address (xx = 1 or 254) as the IP address of the Firewall / Router, and have each other device on the network configured to use this as its "default gateway".
Google security survey results
All services here are provided on a best-effort basis with no guarantee beyond statutory warranties unless otherwise previously established by contract.
If any supplied service does not meet your expectations, contact Mark as soon as possible to discuss rectification or refund. A full or negotiated partial refund will be offered if rectification has already been attempted and you are still not satisfied.
These web pages are hosted on . I also use Free DNS. Markup validated as and .