Why change the default administrator login and password

Assignment Help Computer Network Security
Reference no: EM13763992

Part 1

What should you know about website privacy?

You have none specially when using public networks such at McDonalds WIFI. We have grown used to browsing through our bank statements and buying things online using public networks or our own networks. Public networks have no security whatsoever. The wrong people can get their hands on your information with the simple help of a few softwares and some basic knowledge about hacking. You can easily help yourself decrease the level of vulnerability by using your own data plan or adding proxys. Also you should avoid saving passwords while on public WIFIS or browsing sensitive information.

How do you know when an online transaction is secure?

To make sure an online transaction is secure the user has to make sure to use websites that at least use HTTP, these are websites that encrypts anything the user sends and receives. If the user wants to be a little more secure they can use a VPN service that encrypts all the information you send. Also Network settings should be configured to not sharing any files to make a hackers life a little bit harder.

Why is Anti-spyware software important to my online security?

Anti- spyware security acts as another layer of defense. Spyware is exactly like it says a spy. It is design to steal your identity and watch everything you watch on your computer to include your credit card information. It seems that PCs are more vulnerable to be infected than macs are. Macs have all these extra layers of protections that make our lives easier. Mac users still have to be as prepare to prevent malware and spyware just as much as PC users.

Q- The author of your text suggests that the ability to connect to the Internet via Wi-Fi is available everywhere Bowles, (2013). As such, there are risks to your data and personally identifiable information. These considerations are especially important when we consider connecting our home network to the Internet. We may take for granted such functionality as online banking, e-commerce, and other transactions where we share personally identifiable information. Refer to the Siles (2012) article for more information on securing your home wireless network.

Based on this week's readings, what are some of the important measures you can take to ensure that your home wireless network is safe and secure?

After your primary post, respond to at least two of your classmates' posts

Part 2

Based on readings, what are some of the important measures you can take to ensure that your home wireless network is safe and secure?

Change the default administrator login and password. Use something only you will remember.

The administrative access to Wi-Fi access point should be changed to a physical network connection. Use an Ethernet Cable to physically connect to the Wi-Fi system. If using a wireless administrative access disable HTTP and require HTTPS. HTTPS supports encryption (Siles, 2012).

Make sure only people you know and trust have access to your Wi-Fi. By applying a security mechanism WPA2 a password is required and connections will be encrypted.

Use strong passwords with at least 20 characters.

Disable WPS. Vulnerabilities have been found that may allow hackers full access to your wireless network

Configure your Wi-Fi network to use OpenDNS as your DNS servers. This will allow you to manage what websites are assessable.

Part 3

Based on readings, what are some of the important measures you can take to ensure that your home wireless network is safe and secure?

It is impossible to warranty that your home WIFI will never be breach. However, it is very possible to try to make it as hard as you can for someone to break in. Here are some simple steps that The Monthly Security Awareness Newsletter for Computer Users recommends.

· Have a login and password set up for your WIFI access point. It is like locking your door so only people you want in your house get in.

· It is recommended to use an Ethernet cable to connect to the network over WIFI. If WIFI is a must have then Require HTTPS over HTTP. HTTPS support encryption for everything you send and everything that comes in.

· Enable WPA2 as a security option. WPA2 requires you to enter a password to enter the network.

· It is recommended the password is 20 characters long. It is recommended to use Caps, lower case, numbers and special characters to make the difficulty of guessing higher.

Even if you set all these steps to the best of any ones knowledge there is till that one chance that because you took all these precautions a hacker did not bother accessing your WIFI.

Reference no: EM13763992

Questions Cloud

The central nervous system and immunosation : Explain how the spread of the infection within a population can be limited by immunization and other measures and the consequences of a zoonotic disease pool for herd-immunity.
Security issues : A computer forensics investigator needs to develop an understanding about security standards and formal procedures within an organisation.
How is a deposition different from expert testimony : How is a deposition different from expert testimony and What are the top 5 things you should do during a deposition
How is a deposition different from expert testimony : How is a deposition different from expert testimony and What are the top 5 things you should do during a deposition
Why change the default administrator login and password : what are some of the important measures you can take to ensure that your home wireless network is safe and secure. Change the default administrator login and password. Use something only you will remember.
Explain five defining features of modernism and renaissance : Explain five defining features of Modernism, Post Modernism, Classicism, Renaissance, Enlightenment, Naturalism, Romanticism and Realism.
Finding exif data in the photos : This project will have you validating forensic images, processing the data forensically by conducting key word searches and locating graphic files, as well as, finding EXIF data in the photos to determine what tools Chris used to take pictures of ..
Finance industry-based organization : Imagine that you work for a finance industry-based organization. Your organization is looking to submit its database design documentation to an evaluation team in order to meet Sarbanes-Oxley (SOX) compliance.
Federal rules of civil procedure : This is a peer review presentation. Find a case from Kroll Ontrack's website that deal with one of the following the Federal Rules of Civil Procedure, explain why the rule is important in this particular case and create a presentation for peer-rev..

Reviews

Write a Review

 

Computer Network Security Questions & Answers

  How asymmetric cryptography is used to provide encryption

Briefly compare and contrast how asymmetric cryptography is used to provide encryption as opposed to how it can be used to provide a digital signature.

  Using cbc mode of operation what are consequences

Using CBC mode of operation what are the consequences of decrypting the cipher text if it has an error in the first bit of the first block C?

  Variation of rsa encryption and decryption

Why would a variation of RSA encryption/decryption where a single prime number is used the modolus insecure? How can someone recover a message x from the encrypted value.

  Determine public values transmitted for message

Alice and Bob select the numbers 6 and 10 privately. What will be public values they transmit and what would be final secret computed?

  Describe the life cycle of an information system

Suppose that you run a photography printing store. Your workers have been using punch cards for time entry since you started the business.

  Design a security plan that describes counter-measures

Design a security plan that describes counter-measures that will manage the threats that put the organisation's information assets at risk. The security plan should cover a full range of protection measures

  Discuss how standards for encryption modules

Go to the NIST FIPS 140-2 standards Website and read about the 140-2 encryption standards along with its annexes, discuss how standards for encryption modules and algorithms benefit the furtherance of Web application security

  Security of information in government organisations

Complete a research essay about information security. The research provides you with the opportunity to complete research and demonstrate knowledge of information security from a theoretical perspective

  Developing a simple biometric authentication model

Developing an encryption/decryption demo (mainly for learning and teaching purposes)

  Make an incident-response policy that covers the

gem infosys a small software company has decided to better secure its computer systems after a malware attack shut down

  Describe a process that would allow alice to send a message

Suppose that Alice and Bob need to communicate, and have decided to use asymmetric (public key) encryption.

  Advantage and disadvantage of key diversi?cation

Sally generates key KA when required as KA = h(Alice,KS ),with keys KB and KC generated in similar manner. Explain one advantage and one disadvantage of key diversi?cation.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd