Question

In: Operations Management

We rely on wireless networks everyday and put much trust in the activities that we do...

We rely on wireless networks everyday and put much trust in the activities that we do on them. This makes it extremely important to protect them from threats and take measures to protect ourselves while working on them as well.

1. List at least 5 ways that you can secure a wireless network to make your activities on them less vulnerable to attack.

2. In your own words, write at least ten sentences supporting your list.

Solutions

Expert Solution

The 5 ways through which we can secure a wireless network to make activities less vulnerable to attack are as follows-

1) In most of the cases when anybody purchases a new wireless router, they never change the router name and the password. People keep the password as default like 1234, password or maybe their own name, so these type of password can be easily hacked by the hacker and they can easily make a guess and can hack it. So we should never keep the name or password as default, it should always be something difficult that cannot be guessed easily.

2) Secondly, we should encrypt the data in our system. Go to setting option and select WPA encryption option, if anyone is not having WPA encryption then they can select only WPA encryption, this will protect your system data from the hackers.

3) Use MAC filtering list, this is basically a list of authorised devices that can connect to the network and any device which is not on the list will not be able to connect even if it has the correct password to do so. If a person who don't add new devices on regular basis, then this option will be one the best way to protect your system.

4) Turn off WPS technology, this was a technology brought in for convenience as by only pressing a single button on the router and it can create a faster connection for a new device to join the network.

5) Changing the device SSID name. As with the default password, it is very easy for hackers to identify the SSID name and the can hack the network very easily. In the market there are many routers is available and the name on each router is almost same, so it is very easy for the hacker to hack it and use it.

ANSWER 2-

The above-mentioned list is sufficient for anyone who is using the wireless system as it covers almost all the things. Firstly the password should not easily because then it can be easily guessed by the hacker. Then we should also change the name of the SSID as if it is default only then it can easily be traced b the hackers and they can misuse it. Thirdly we should always use WPA encryption on the system as it protect the data of the system from being hacked. And by MAC filtering we can eliminate unwanted users as well, because with he help of this option we can open the network only to the connected devices and these ways the network remains safe. And lastly, we use select less range for the router network as if the network is accessible from a far distance then it is more prone to be hacked.


Related Solutions

In C++ One of the things we rely on computers to do for us is to...
In C++ One of the things we rely on computers to do for us is to store information. We keep files, movies and music (all legally obtained of course...), and a host of data to help us keep organized. This week your challenge (the last one!) is to make a program that keeps a collection of lists. You'll manage a grocery, hardware store, and chore list all in the same program. You'll use files to store those lists so that...
How much do you rely on communications? When you answer this, consider the number of text...
How much do you rely on communications? When you answer this, consider the number of text messages, phone calls, and e-mails you have either sent or received in the last 24 hours from your computer or smartphone. Is the number any different from one of the days from last week? Do you think you could refrain from sending or receiving any of these types of communication for a day? Why, or why not? How reliant are you on telecommunications? Explain..
Mark the WRONG statement. A. Some Project networks do not have a critical path. B. Activities...
Mark the WRONG statement. A. Some Project networks do not have a critical path. B. Activities on a critical path have a float of zero. C. A delay in critical activity surely delays the completion of project. D. A network can have more than one critical path. E. Each critical activity has identical earliest and the latest start times.
1 Do you believe that all individuals use probabilities consciously in everyday activities to make decisions?...
1 Do you believe that all individuals use probabilities consciously in everyday activities to make decisions? Why or why not? 2 Do you believe that statistics can be used to prove either side of any argument? Why or why not? 400 words each question no plagiarism please.
Do you believe that all individuals use probabilities consciously in everyday activities to make decisions? Why...
Do you believe that all individuals use probabilities consciously in everyday activities to make decisions? Why or why not? 450  words no plagiarism please
Why do we include a moisture barrier on exterior walls and why do we put it...
Why do we include a moisture barrier on exterior walls and why do we put it between the sheathing and the siding of the wall?
Background: How much do we purchase and how do we pay for these purchases? According to...
Background: How much do we purchase and how do we pay for these purchases? According to recent data from US Bureau of Economic Analysis, U.S. consumer spending (personal consumption expenditures) rose to over $14 trillion from June 2018 to June 2019. This includes spending on all categories, ranging from cars and furniture to clothing and health care. At the same time, the Federal Reserve reports that total household debt has increased to approximately $13.67 trillion. This includes housing debt, student...
In class we discussed Transitive Trust. And we covered so many different types of attacks. Do...
In class we discussed Transitive Trust. And we covered so many different types of attacks. Do you think that there may be an attack on Trust? Explain your answer.
Do we need goverment regulations of social activities problems?
Do we need goverment regulations of social activities problems?
Is virtual currency something we can trust? Do you think it will be granted as some...
Is virtual currency something we can trust? Do you think it will be granted as some kind of standard currency? (3-4 paragraphs)
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT