Why change the default administrator login and password

Assignment Help Computer Network Security
Reference no: EM13763992

Part 1

What should you know about website privacy?

You have none specially when using public networks such at McDonalds WIFI. We have grown used to browsing through our bank statements and buying things online using public networks or our own networks. Public networks have no security whatsoever. The wrong people can get their hands on your information with the simple help of a few softwares and some basic knowledge about hacking. You can easily help yourself decrease the level of vulnerability by using your own data plan or adding proxys. Also you should avoid saving passwords while on public WIFIS or browsing sensitive information.

How do you know when an online transaction is secure?

To make sure an online transaction is secure the user has to make sure to use websites that at least use HTTP, these are websites that encrypts anything the user sends and receives. If the user wants to be a little more secure they can use a VPN service that encrypts all the information you send. Also Network settings should be configured to not sharing any files to make a hackers life a little bit harder.

Why is Anti-spyware software important to my online security?

Anti- spyware security acts as another layer of defense. Spyware is exactly like it says a spy. It is design to steal your identity and watch everything you watch on your computer to include your credit card information. It seems that PCs are more vulnerable to be infected than macs are. Macs have all these extra layers of protections that make our lives easier. Mac users still have to be as prepare to prevent malware and spyware just as much as PC users.

Q- The author of your text suggests that the ability to connect to the Internet via Wi-Fi is available everywhere Bowles, (2013). As such, there are risks to your data and personally identifiable information. These considerations are especially important when we consider connecting our home network to the Internet. We may take for granted such functionality as online banking, e-commerce, and other transactions where we share personally identifiable information. Refer to the Siles (2012) article for more information on securing your home wireless network.

Based on this week's readings, what are some of the important measures you can take to ensure that your home wireless network is safe and secure?

After your primary post, respond to at least two of your classmates' posts

Part 2

Based on readings, what are some of the important measures you can take to ensure that your home wireless network is safe and secure?

Change the default administrator login and password. Use something only you will remember.

The administrative access to Wi-Fi access point should be changed to a physical network connection. Use an Ethernet Cable to physically connect to the Wi-Fi system. If using a wireless administrative access disable HTTP and require HTTPS. HTTPS supports encryption (Siles, 2012).

Make sure only people you know and trust have access to your Wi-Fi. By applying a security mechanism WPA2 a password is required and connections will be encrypted.

Use strong passwords with at least 20 characters.

Disable WPS. Vulnerabilities have been found that may allow hackers full access to your wireless network

Configure your Wi-Fi network to use OpenDNS as your DNS servers. This will allow you to manage what websites are assessable.

Part 3

Based on readings, what are some of the important measures you can take to ensure that your home wireless network is safe and secure?

It is impossible to warranty that your home WIFI will never be breach. However, it is very possible to try to make it as hard as you can for someone to break in. Here are some simple steps that The Monthly Security Awareness Newsletter for Computer Users recommends.

· Have a login and password set up for your WIFI access point. It is like locking your door so only people you want in your house get in.

· It is recommended to use an Ethernet cable to connect to the network over WIFI. If WIFI is a must have then Require HTTPS over HTTP. HTTPS support encryption for everything you send and everything that comes in.

· Enable WPA2 as a security option. WPA2 requires you to enter a password to enter the network.

· It is recommended the password is 20 characters long. It is recommended to use Caps, lower case, numbers and special characters to make the difficulty of guessing higher.

Even if you set all these steps to the best of any ones knowledge there is till that one chance that because you took all these precautions a hacker did not bother accessing your WIFI.

Reference no: EM13763992

Analyze how coppa and cipa are similar

Analyze how COPPA and CIPA are similar and how they are different, and explain why there is a need for two (2) different acts. Describe what you believe are the most challengi

Computer crime events in history

Research the Internet for two significant computer crime events in history. Gather details on the impacts of these crimes and identify the victims, identify details on how t

Encrypt the plaintext sendmoremoney with the key stream

Explores the use of a one-time pad version of the Vigenère cipher. In this scheme, the key is a stream of random numbers between 0 and 26. For example, if the key is 3 19 5.

Develop a network security policy for a global organization

Develop a network security policy for a global organization. The security was violated in different situations. There are various elements in which need to be discussed and

Information security

A computer forensics investigator needs to develop an understanding about security standards and formal procedures within an organisation. This module will provide knowledge

Create and describe a comprehensive security policy

Present the rationale for the logical and physical topographical layout of the planned network. Create and describe a comprehensive security policy for this data-collection an

Analyse the various approaches for mitigating security risk

This assignment is for students to meet parts of the following learning outcomes. Be able to critically analyse the various approaches for mitigating security risk, includin

Research and report recent information security incident

Do some research and report a recent information security incident. How could this incident have been avoided? What management challenges did this incident present?


Write a Review

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd