In: Computer Science
The protections from the security software must continue when the device is taken off the network, such as when it is off-grid, or in airplane mode and similar. Still, much of the time, software writers can expect the device to be online and connected, not only to a local network but to the World Wide Web, as well. Web traffic, as we have seen, has its own peculiar set of security challenges. What are the challenges for an always connected, but highly personalized device?
If the attacker want to capture the data the device must be online as global only.with local the people those who are present in local network they can only hack the device.because all the data can transfer through the nic cards in laptops which can have ports.based on the ports the data can enter into ports.for example if we have home it can have door like a port.some Person will knock the door.we used door secret whole to check the particular person if the person is knew to us we can open the door otherwise we can't open.the same scenario works as world wife web or Internet for accessing particular data.if the door is there we can knock and either enter or not if they can't open we used some gadgets to break the door for enter the home.so hackers also if we are present at Internet or not.if the Internet is there in the sense door is there.if the Internet is not there.than there will be no door for entrance.so if we are not at online the can't hack the device.some softwares run in our phone background and consumes the data and sent to the hacker.so don't access any unnessary links which are not useful to us.
#if you have any doubt comment below..