Question

In: Computer Science

describe Public Wi-Fi Hotspot Security

describe Public Wi-Fi Hotspot Security

Solutions

Expert Solution

Use a VPN

A virtual private network (VPN) connection is a must when connecting to your business through an unsecured connection, like a Wi-Fi hotspot. Even if a hacker manages to position himself in the middle of your connection, the data here will be strongly encrypted. Since most hackers are after an easy target, they'll likely discard stolen information rather than put it through a lengthy decryption process.

Use SSL Connections

You aren't likely to have a VPN available for general Internet browsing, but you can still add a layer of encryption to your communication. Enable the "Always Use HTTPS" option on websites that you visit frequently, or that require you to enter some kind of credentials. Remember that hackers understand how people reuse passwords, so your username and password for some random forum may be the same as it is for your bank or corporate network, and sending these credentials in an unencrypted manner could open the door to a smart hacker. Most websites that require an account or credentials have the "HTTPS" option somewhere in their settings.

Turn Off Sharing

When connecting to the Internet at a public place, you're unlikely to want to share anything. You can turn off sharing from the system preferences or Control Panel, depending on your OS, or let Windows turn it off for you by choosing the "Public" option the first time you connect to a new, unsecured network.

Keep Wi-Fi Off When You Don't Need It

Even if you haven't actively connected to a network, the Wi-Fi hardware in your computer is still transmitting data between any network within range. There are security measures in place to prevent this minor communication from compromising you, but not all wireless routers are the same, and hackers can be a pretty smart bunch. If you're just using your computer to work on a Word or Excel document, keep your Wi-Fi off. As a bonus, you'll also experience a much longer battery life.

Stay Protected

Even individuals who take all the possible public Wi-Fi security precautions are going to run across issues from time to time. It's just a fact of life in this interconnected age. That's why it's imperative to keep a robust Internet security solution installed and running on your machine. These solutions can constantly run a malware scan on your files, and will always scan new files as they are downloaded. The top consumer security software will also offer business protection solutions, so you can protect yourself while you're out and about, and your servers back at the office, all at the same time.


Related Solutions

What is the relationship between Bluetooth and Wi-Fi? What security challenges do Wi-Fi and Bluetooth technology...
What is the relationship between Bluetooth and Wi-Fi? What security challenges do Wi-Fi and Bluetooth technology present for a company?
Create a policy for 802.11 Wi-Fi security in a wireless network in a five-person company with...
Create a policy for 802.11 Wi-Fi security in a wireless network in a five-person company with a one-access point WLAN. This is not a trivial task. Do not just jot down a few notes. Make it a document for people in your firm to read.
Create a policy for 802.11 Wi-Fi security in a wireless network in a 500-employee company with...
Create a policy for 802.11 Wi-Fi security in a wireless network in a 500-employee company with a 47-access point WLAN. This is not a trivial task. Do not just jot down a few notes. Make it a document for people in your firm to read.
Create a policy for 802.11 Wi-Fi security in a wireless network in a 500-employee company with...
Create a policy for 802.11 Wi-Fi security in a wireless network in a 500-employee company with a 47-access point WLAN. This is not a trivial task. Do not just jot down a few notes. Make it a document for people in your firm to read.
Part I: Create a policy for 802.11 Wi-Fi security in a wireless network in a 500-employee...
Part I: Create a policy for 802.11 Wi-Fi security in a wireless network in a 500-employee company with a 47-access point WLAN. This is not a trivial task. Create the official communication document.   Part II:     18.  a) What is the main problem with IPv4 that IPv6 was created to solve?            b) How does IPv6 solve this problem?    19.  a) What has been holding back the adoption of IPv6?           b) What is pushing IPv6 adoption now?
A company uses AD and RADIUS To authenticate VPN in Wi-Fi connections. The Chief Information Security...
A company uses AD and RADIUS To authenticate VPN in Wi-Fi connections. The Chief Information Security Officer initiates a protect to extend a third-party MFA solution to VPN. During the pilot phase, VPN users successfully get an MFA challenge; however, they also get the challenge when connecting to Wi-Fi, which is not desirable. Which of the following best explains why you just are getting the MFA challenge in using Wi-Fi? In the radius server, the proxy rule has not specified...
CASE 1-WI-FI INC. OVERVIEW Attach Wi-Fi to a broadband modem and any nearby computer equipped with...
CASE 1-WI-FI INC. OVERVIEW Attach Wi-Fi to a broadband modem and any nearby computer equipped with Wi-Fi receptors and you can log on to the Net. Wi-Fi networks, known as hot spots have popped up so tfast that more than 18 million people worldwide have logged on, and the numbers are growing daily. The challenge is to transform this innovation into a global business, developing coherent and dependable networks, coming up with billing systems, roaming agreements, and technical standards. Wi-Fi...
How has wi-fi changed the landscape of channel technology?
How has wi-fi changed the landscape of channel technology?
What is the function of Bluetooth, Wi-fi, Satellite methods of technology and which is appropriate for...
What is the function of Bluetooth, Wi-fi, Satellite methods of technology and which is appropriate for what function? Course: Information Technology for the Health Professions
In a Wi-Fi network, data packets are transmitted between a laptop computer and the access point....
In a Wi-Fi network, data packets are transmitted between a laptop computer and the access point. Since the transmission is wireless, errors can occur that may render the packet useless, so, when received in error, the packet is discarded. As a protection for errors, an acknowledgement is expected, and if the packet is received in error, it is retransmitted, until correctly received. Consider that the probability that a packet is discarded is p=0.6. (a) What is the probability that the...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT