Why change the default administrator login and password

Assignment Help Computer Network Security
Reference no: EM13763992

Part 1

What should you know about website privacy?

You have none specially when using public networks such at McDonalds WIFI. We have grown used to browsing through our bank statements and buying things online using public networks or our own networks. Public networks have no security whatsoever. The wrong people can get their hands on your information with the simple help of a few softwares and some basic knowledge about hacking. You can easily help yourself decrease the level of vulnerability by using your own data plan or adding proxys. Also you should avoid saving passwords while on public WIFIS or browsing sensitive information.

How do you know when an online transaction is secure?

To make sure an online transaction is secure the user has to make sure to use websites that at least use HTTP, these are websites that encrypts anything the user sends and receives. If the user wants to be a little more secure they can use a VPN service that encrypts all the information you send. Also Network settings should be configured to not sharing any files to make a hackers life a little bit harder.

Why is Anti-spyware software important to my online security?

Anti- spyware security acts as another layer of defense. Spyware is exactly like it says a spy. It is design to steal your identity and watch everything you watch on your computer to include your credit card information. It seems that PCs are more vulnerable to be infected than macs are. Macs have all these extra layers of protections that make our lives easier. Mac users still have to be as prepare to prevent malware and spyware just as much as PC users.

Q- The author of your text suggests that the ability to connect to the Internet via Wi-Fi is available everywhere Bowles, (2013). As such, there are risks to your data and personally identifiable information. These considerations are especially important when we consider connecting our home network to the Internet. We may take for granted such functionality as online banking, e-commerce, and other transactions where we share personally identifiable information. Refer to the Siles (2012) article for more information on securing your home wireless network.

Based on this week's readings, what are some of the important measures you can take to ensure that your home wireless network is safe and secure?

After your primary post, respond to at least two of your classmates' posts

Part 2

Based on readings, what are some of the important measures you can take to ensure that your home wireless network is safe and secure?

Change the default administrator login and password. Use something only you will remember.

The administrative access to Wi-Fi access point should be changed to a physical network connection. Use an Ethernet Cable to physically connect to the Wi-Fi system. If using a wireless administrative access disable HTTP and require HTTPS. HTTPS supports encryption (Siles, 2012).

Make sure only people you know and trust have access to your Wi-Fi. By applying a security mechanism WPA2 a password is required and connections will be encrypted.

Use strong passwords with at least 20 characters.

Disable WPS. Vulnerabilities have been found that may allow hackers full access to your wireless network

Configure your Wi-Fi network to use OpenDNS as your DNS servers. This will allow you to manage what websites are assessable.

Part 3

Based on readings, what are some of the important measures you can take to ensure that your home wireless network is safe and secure?

It is impossible to warranty that your home WIFI will never be breach. However, it is very possible to try to make it as hard as you can for someone to break in. Here are some simple steps that The Monthly Security Awareness Newsletter for Computer Users recommends.

· Have a login and password set up for your WIFI access point. It is like locking your door so only people you want in your house get in.

· It is recommended to use an Ethernet cable to connect to the network over WIFI. If WIFI is a must have then Require HTTPS over HTTP. HTTPS support encryption for everything you send and everything that comes in.

· Enable WPA2 as a security option. WPA2 requires you to enter a password to enter the network.

· It is recommended the password is 20 characters long. It is recommended to use Caps, lower case, numbers and special characters to make the difficulty of guessing higher.

Even if you set all these steps to the best of any ones knowledge there is till that one chance that because you took all these precautions a hacker did not bother accessing your WIFI.

Reference no: EM13763992

Questions Cloud

The central nervous system and immunosation : Explain how the spread of the infection within a population can be limited by immunization and other measures and the consequences of a zoonotic disease pool for herd-immunity.
Security issues : A computer forensics investigator needs to develop an understanding about security standards and formal procedures within an organisation.
How is a deposition different from expert testimony : How is a deposition different from expert testimony and What are the top 5 things you should do during a deposition
How is a deposition different from expert testimony : How is a deposition different from expert testimony and What are the top 5 things you should do during a deposition
Why change the default administrator login and password : what are some of the important measures you can take to ensure that your home wireless network is safe and secure. Change the default administrator login and password. Use something only you will remember.
Explain five defining features of modernism and renaissance : Explain five defining features of Modernism, Post Modernism, Classicism, Renaissance, Enlightenment, Naturalism, Romanticism and Realism.
Finding exif data in the photos : This project will have you validating forensic images, processing the data forensically by conducting key word searches and locating graphic files, as well as, finding EXIF data in the photos to determine what tools Chris used to take pictures of ..
Finance industry-based organization : Imagine that you work for a finance industry-based organization. Your organization is looking to submit its database design documentation to an evaluation team in order to meet Sarbanes-Oxley (SOX) compliance.
Federal rules of civil procedure : This is a peer review presentation. Find a case from Kroll Ontrack's website that deal with one of the following the Federal Rules of Civil Procedure, explain why the rule is important in this particular case and create a presentation for peer-rev..

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd