Peripheral devices

WLAN

WLAN stands for Wireless Local Area Network. In a WLAN the device (e.g. a laptop, PDA, etc.) communicates via a wireless connection with a WLAN Access Point which is connected (just like a normal computer) via a cable to the Internet or the local network. As the devices are not wired up the users are mobile. This is the advantage of a WLAN. The indoor range depends on structural factors and is considerably lower than outdoors, where WLAN connections are possible over more than 200 metres. 
 
What need to be done

  • Protection of the administration page
    Most WLAN access points have a user interface for administration that is accessible by browser (http://IP_ADDRESS_OF_ACCESS_POINT). The settings described below can also be configured with this interface. Access to this administration page is protected by a standard password which should be changed immediately. 

  • Change the network name
    Change the default network name (SSID).

  • Suppress network name broadcasts
    Prevent the WLAN access point from regularly broadcasting its network name (SSID). For this, the « Broadcast SSID » option must be set to « No ».

  • Limited access to your devices
    Limit access to your access point so that only your devices can communicate with it. This can be done by defining the devices' MAC addresses.

  • Switching on the encryption
    In the WLAN hardware, activate the WPA or WPA2 encryption and select a strong password for this.

  • Use secure protocols
    If confidential data are transmitted on your WLAN it is recommended that protocols that perform (additional) encryption be used (e.g. VPN, https, ssh, etc.). 

Router

Devices that are connected directly to the internet merit special protection. This includes not only the setting of passwords that meet the latest requirements, but also the consistent updating of devices with the most up-to-date software or firmware.

Smartphone

The days when cellular telephones were used only for making calls are long gone. Comprehensive functions such as integrated camera, appointments calendar, games, text messaging and MMS functions, infrared and Bluetooth support and the possibility of surfing the web turn mobile phones into tiny multi-functional devices. However, the greater the number of functions on the device, the greater the likelihood of weaknesses.

Protection

  • Update
    Updates are available for smartphones just as they are for computer systems. It is recommended that you download and install the latest updates regularly.

  • App rights
    To perform their functions, apps require certain rights. However, there are also apps which request rights that are not absolutely necessary. Restrict rights, where possible. If you have a bad feeling about it, do not install the app.

  • Backup
    A lot of important data is stored on smartphones, so it is particularly advisable to make regular backups, not just because of technical failures, but also because smartphones can be stolen or go missing.

  • PIN code and data encryption
    As smartphones can be stolen, choose the most secure PIN code possible and encrypt your sensible data.

  • Greater awareness when dealing with Cloud services
    When using Cloud services, make sure you know what data is saved where. Deactivate any cloud services that you are not using.

  • Caution with text messages from unknown persons
    Do not respond to SMS messages from unknown persons. 

Webcam

Devices that are connected directly to the internet merit special protection. This includes not only the setting of passwords that meet the latest requirements, but also the consistent updating of devices with the most up-to-date software or firmware. MELANI recommends covering webcams with adhesive tape when they are not in use. Nowadays, there are also special camera covers that can be used to temporarily cover the camera lens.

Last modification 03.07.2015

Top of page

https://www.melani.admin.ch/content/melani/en/home/schuetzen/sekundaere-grundschutz.html