Identity theft seems to be all the rage nowadays.
I'm not smart with computers, but I need to learn. I would like to know the best practices for home network security. The problem is I just don’t know standard practice or what people usually do. I am concerned about the following:
--break-ins from the outside internet
--break-ins from someone logging onto my wifi
--a home invader stealing my data and identity
--government: there's a low chance I would ever be raided by the government, but I would like to have by bases covered and not leave things 'in plain site' that I intended to be private.
Should I consider other attack vectors or weaknesses?
I have the following hardware:
ATT 2Wire gateway/router thing. It's in a closet, and physically secured.
2 netbooks (His-n-Hers, currently connect via wireless, WPA2). We take these on the road and leave them lying around the house.
A new server--this is in a closet, and physically secured. I haven't hooked this up yet. The purpose is to serve large media files, and also to be a central store of important office and financial information, instead of having that information scattered across the netbooks.
A new home theater computer--this sits out by the TV, and is on 24/7. It is not physically secure. I haven't networked it yet.
A wife of average computer literacy.
Assuming I'm setting all this up from scratch, what user accounts to set up on the server? One for me and one for her? Should I use different usernames and passwords for the laptops and the home theater PC compared to the server? What should I encrypt?
My musings:
The laptops:
I have this idea that it would be cool to host my important ~/office directory on the server, and access those files through SSH (ok for basic stuff, not for wife) or SSHfs (making it more transparently usable). I can have some kind of 'click on the icon and enter password to mount' system, and then I have to be careful not to leave the netbooks lying around powered-up and logged in. But as long as I set the laptop user accounts up with reasonably strong passwords, and set them to lock the screen, even if they aren't physically secure, nobody will be able to access the server files unless they know the password to the _server_ user account that has the ~/office directory. Is this correct? I don't know of any way to auto-mount the ~/office directory that would be secure for a laptop which may be stolen.
Server: It's locked in a closet. It has no wifi chip. I do not have full-disk encryption, and I didn't opt to encrypt my home directory when I installed Ubuntu. I guess I can create some kind of TrueCrypt directory and put all my sensitive documents in that. The only point of encrypting, the way I understand, is in case someone breaks in and steals my hard drive, right? I don't feel the need to encrypt my media directory anyway. If I want both me and my wife to access the same office documents directory, do I create user accounts on the server for both of us? One root account and 2 less privileged user accounts? Only one account with sudo that we both use?
Home Theater computer:
I want this to auto-login and stay on 24/7. The thing that concerns me is how to prevent someone using the HTPC to break into the server. I can create a 'nobody' user on this system and have it auto-login as 'nobody'. I need to auto-mount the media directory on the server, so I would use NFS. If I set up ~/media in the server's /etc/exports directory, mounted -ro for the HTPC's hostname, then this should be reasonably secure, and auto-mountable, right? If I want to log into the server from the HTPC to make changes, which I might want to do to reshuffle media or whatever, I can open a terminal from the 'nobody' account on the HTPC and login to the server _as a user on the server_, correct? I will still need to know the password for that user account on the server, so nobody else will be able to to do this. Does this sound right?