Why change the default administrator login and password

Assignment Help Computer Network Security
Reference no: EM13763992

Part 1

What should you know about website privacy?

You have none specially when using public networks such at McDonalds WIFI. We have grown used to browsing through our bank statements and buying things online using public networks or our own networks. Public networks have no security whatsoever. The wrong people can get their hands on your information with the simple help of a few softwares and some basic knowledge about hacking. You can easily help yourself decrease the level of vulnerability by using your own data plan or adding proxys. Also you should avoid saving passwords while on public WIFIS or browsing sensitive information.

How do you know when an online transaction is secure?

To make sure an online transaction is secure the user has to make sure to use websites that at least use HTTP, these are websites that encrypts anything the user sends and receives. If the user wants to be a little more secure they can use a VPN service that encrypts all the information you send. Also Network settings should be configured to not sharing any files to make a hackers life a little bit harder.

Why is Anti-spyware software important to my online security?

Anti- spyware security acts as another layer of defense. Spyware is exactly like it says a spy. It is design to steal your identity and watch everything you watch on your computer to include your credit card information. It seems that PCs are more vulnerable to be infected than macs are. Macs have all these extra layers of protections that make our lives easier. Mac users still have to be as prepare to prevent malware and spyware just as much as PC users.

Q- The author of your text suggests that the ability to connect to the Internet via Wi-Fi is available everywhere Bowles, (2013). As such, there are risks to your data and personally identifiable information. These considerations are especially important when we consider connecting our home network to the Internet. We may take for granted such functionality as online banking, e-commerce, and other transactions where we share personally identifiable information. Refer to the Siles (2012) article for more information on securing your home wireless network.

Based on this week's readings, what are some of the important measures you can take to ensure that your home wireless network is safe and secure?

After your primary post, respond to at least two of your classmates' posts

Part 2

Based on readings, what are some of the important measures you can take to ensure that your home wireless network is safe and secure?

Change the default administrator login and password. Use something only you will remember.

The administrative access to Wi-Fi access point should be changed to a physical network connection. Use an Ethernet Cable to physically connect to the Wi-Fi system. If using a wireless administrative access disable HTTP and require HTTPS. HTTPS supports encryption (Siles, 2012).

Make sure only people you know and trust have access to your Wi-Fi. By applying a security mechanism WPA2 a password is required and connections will be encrypted.

Use strong passwords with at least 20 characters.

Disable WPS. Vulnerabilities have been found that may allow hackers full access to your wireless network

Configure your Wi-Fi network to use OpenDNS as your DNS servers. This will allow you to manage what websites are assessable.

Part 3

Based on readings, what are some of the important measures you can take to ensure that your home wireless network is safe and secure?

It is impossible to warranty that your home WIFI will never be breach. However, it is very possible to try to make it as hard as you can for someone to break in. Here are some simple steps that The Monthly Security Awareness Newsletter for Computer Users recommends.

· Have a login and password set up for your WIFI access point. It is like locking your door so only people you want in your house get in.

· It is recommended to use an Ethernet cable to connect to the network over WIFI. If WIFI is a must have then Require HTTPS over HTTP. HTTPS support encryption for everything you send and everything that comes in.

· Enable WPA2 as a security option. WPA2 requires you to enter a password to enter the network.

· It is recommended the password is 20 characters long. It is recommended to use Caps, lower case, numbers and special characters to make the difficulty of guessing higher.

Even if you set all these steps to the best of any ones knowledge there is till that one chance that because you took all these precautions a hacker did not bother accessing your WIFI.

Reference no: EM13763992

Questions Cloud

The central nervous system and immunosation : Explain how the spread of the infection within a population can be limited by immunization and other measures and the consequences of a zoonotic disease pool for herd-immunity.
Security issues : A computer forensics investigator needs to develop an understanding about security standards and formal procedures within an organisation.
How is a deposition different from expert testimony : How is a deposition different from expert testimony and What are the top 5 things you should do during a deposition
How is a deposition different from expert testimony : How is a deposition different from expert testimony and What are the top 5 things you should do during a deposition
Why change the default administrator login and password : what are some of the important measures you can take to ensure that your home wireless network is safe and secure. Change the default administrator login and password. Use something only you will remember.
Explain five defining features of modernism and renaissance : Explain five defining features of Modernism, Post Modernism, Classicism, Renaissance, Enlightenment, Naturalism, Romanticism and Realism.
Finding exif data in the photos : This project will have you validating forensic images, processing the data forensically by conducting key word searches and locating graphic files, as well as, finding EXIF data in the photos to determine what tools Chris used to take pictures of ..
Finance industry-based organization : Imagine that you work for a finance industry-based organization. Your organization is looking to submit its database design documentation to an evaluation team in order to meet Sarbanes-Oxley (SOX) compliance.
Federal rules of civil procedure : This is a peer review presentation. Find a case from Kroll Ontrack's website that deal with one of the following the Federal Rules of Civil Procedure, explain why the rule is important in this particular case and create a presentation for peer-rev..

Reviews

Write a Review

Computer Network Security Questions & Answers

  De-cipher the message using vigenere cipher analysis tool

Using statistical analysis only on Caesar cipher, decrypt this cipher. Show your work in detail. Do not use brute force - De-cipher the following message using Vigenere Cipher analysis tool

  The set of laws rules directives and practices that

1.the set of laws rules directives and practices that regulate how an organization manages protects and distributes

  Explain prudent policy to protect datafrom corruption-theft

The opposing require to protect this data (from corruption and theft) which typically means controlling access to much/all of the data? What policy is prudent here?

  Effects of security controls

The three effects of security controls are prevention, detection, and recovery. Briefly explain how these effects are related to the known good state

  Perspective of current hot topics in information security

Build an understanding and perspective of current hot topics in Information Security and build generic skills including

  Explain how it is forwarded to its destination

Explain how it is forwarded to its destination and a packet arrived at router R2-m0 with destination address 170.14.24.12. Explain how it is forwarded to its destination.

  An isp has received a block

An ISP has received a block of addresses in which the prefix length (n = 24). The ISP needs to make 8 sub-nets (sub-blocks) of equal sizes from this block. What is the prefix of each sub-block?

  Analyse security procedures

Analyse security procedures

  Rsa with public - private key pair

RSA with three primes would also work: n = pqr, ?(n) = (p?1)(q?1)(r?1), gcd(e, ?(n)) = 1,

  What efforts must be made to help overcome these challenges

What do you believe to be the primary challenges that law enforcement agencies must face in investigating cyber exploitation and cyber crime? What efforts must be made to help overcome these challenges?

  The discussion board is part of the core of online

the discussion board is part of the core of online learning. classroom discussion in an online environment requires

  Why is the nfs option grayed out on the share protocols page

Why is the NFS option grayed out on the Share Protocols page and According to the Server Manager console, what roles are currently installed on the computer

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd