Why change the default administrator login and password

Assignment Help Computer Network Security
Reference no: EM13763992

Part 1

What should you know about website privacy?

You have none specially when using public networks such at McDonalds WIFI. We have grown used to browsing through our bank statements and buying things online using public networks or our own networks. Public networks have no security whatsoever. The wrong people can get their hands on your information with the simple help of a few softwares and some basic knowledge about hacking. You can easily help yourself decrease the level of vulnerability by using your own data plan or adding proxys. Also you should avoid saving passwords while on public WIFIS or browsing sensitive information.

How do you know when an online transaction is secure?

To make sure an online transaction is secure the user has to make sure to use websites that at least use HTTP, these are websites that encrypts anything the user sends and receives. If the user wants to be a little more secure they can use a VPN service that encrypts all the information you send. Also Network settings should be configured to not sharing any files to make a hackers life a little bit harder.

Why is Anti-spyware software important to my online security?

Anti- spyware security acts as another layer of defense. Spyware is exactly like it says a spy. It is design to steal your identity and watch everything you watch on your computer to include your credit card information. It seems that PCs are more vulnerable to be infected than macs are. Macs have all these extra layers of protections that make our lives easier. Mac users still have to be as prepare to prevent malware and spyware just as much as PC users.

Q- The author of your text suggests that the ability to connect to the Internet via Wi-Fi is available everywhere Bowles, (2013). As such, there are risks to your data and personally identifiable information. These considerations are especially important when we consider connecting our home network to the Internet. We may take for granted such functionality as online banking, e-commerce, and other transactions where we share personally identifiable information. Refer to the Siles (2012) article for more information on securing your home wireless network.

Based on this week's readings, what are some of the important measures you can take to ensure that your home wireless network is safe and secure?

After your primary post, respond to at least two of your classmates' posts

Part 2

Based on readings, what are some of the important measures you can take to ensure that your home wireless network is safe and secure?

Change the default administrator login and password. Use something only you will remember.

The administrative access to Wi-Fi access point should be changed to a physical network connection. Use an Ethernet Cable to physically connect to the Wi-Fi system. If using a wireless administrative access disable HTTP and require HTTPS. HTTPS supports encryption (Siles, 2012).

Make sure only people you know and trust have access to your Wi-Fi. By applying a security mechanism WPA2 a password is required and connections will be encrypted.

Use strong passwords with at least 20 characters.

Disable WPS. Vulnerabilities have been found that may allow hackers full access to your wireless network

Configure your Wi-Fi network to use OpenDNS as your DNS servers. This will allow you to manage what websites are assessable.

Part 3

Based on readings, what are some of the important measures you can take to ensure that your home wireless network is safe and secure?

It is impossible to warranty that your home WIFI will never be breach. However, it is very possible to try to make it as hard as you can for someone to break in. Here are some simple steps that The Monthly Security Awareness Newsletter for Computer Users recommends.

· Have a login and password set up for your WIFI access point. It is like locking your door so only people you want in your house get in.

· It is recommended to use an Ethernet cable to connect to the network over WIFI. If WIFI is a must have then Require HTTPS over HTTP. HTTPS support encryption for everything you send and everything that comes in.

· Enable WPA2 as a security option. WPA2 requires you to enter a password to enter the network.

· It is recommended the password is 20 characters long. It is recommended to use Caps, lower case, numbers and special characters to make the difficulty of guessing higher.

Even if you set all these steps to the best of any ones knowledge there is till that one chance that because you took all these precautions a hacker did not bother accessing your WIFI.

Reference no: EM13763992

Case study on computer security

Computer security is not an issue for organizations alone. Anyone whose personal computer is connected to a network or the Internet faces a potential risk of attack. Identif

Identify data security measures to prevent security issues

Suppose you are also in charge of securing your organization's data. Identify at least two (2) data security measures that you believe are necessary to prevent data security

Cost-of-use issues are of client-dominant local area network

What technology and cost-of-use issues are associated with a client-dominant local area network? Think about what happens as the network grows in size.

Explain existing and potential vulnerabilities and threats

Explain Existing and potential vulnerabilities and threats. Suggestions and discussions of methods or tools that can be used to overcome the existing and potential security th

Identity the various security configuration options

Any potential customer of the State Health Centre must be able to securely access all information aspects pertaining to services offered using a variety of mobile devices.

Determine the category of computer crimes

Determine the category of computer crimes or cyber terrorism that presents the greatest overall threat at the present time. Provide a rationale to support your response.

Have you set up your home wireless network

Have you set up your home wireless network to restrict access from unauthorized individuals? Why or why not? What potential problems could arise from someone poaching your ban

Explain what the control helps mitigate in a scada system

Select one control, identify whether the control falls under Management, Operational or Technical Controls and explain what this control helps mitigate in a SCADA system?

Reviews

Write a Review

 
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd