Chat with us, powered by LiveChat DQ7 | excelpaper.org/
+1(978)310-4246 credencewriters@gmail.com
  

DQ7 A 100-150 words

Explain one of the security risks in a wireless network that you would not find in a wired network. How would you mitigate the risk?

REPLY TO RESPONSES 75-100 WORDS

A Marcelino Del Bosque

Piggybacking or Wadriving is when unauthorized users piggyback on your internet connection, they can use it to conduct illegal activities, monitor and capture your web traffic, or steal your personal files. A vast majority of routers and wireless access points have a broadcast range of 300 feet indoors and a 1,000 feet outdoors. Users within this range can connect to an unsecured Wi-Fi network. Malicious users will drive around neighborhoods with a computer and a powerful antenna in search of unsecured wireless network to piggyback off of. This risk can be mitigated by setting up/changing your wifi password, changing/hiding SSID name, monitoring network software, using MAC address filtering, and limiting number of connected devices on your network.

B Willie Hatfield

One security risk that can happen is eavesdropping. Since wireless networks use radio waves to carry data it is hard to protect. Hackers can intercept those radio waves and eavesdrop on wireless networks as long as they are in range of the signal. There are ways to help protect your data and that is to encrypt your data, enable web filtering, and implement end point protections. 

C Sergio Garcia

One wireless network security risk is wireless sniffing. The attacker uses a special packet analyzer to intercept data that is being transmitted over the network. They are also able to monitor and decode network data. Ways to prevent a wireless sniff attack are to use encryption, add a VPN, or a SFTP (Secure File Transfer Protocol).

DQ7 B 100-150 words

What are some common ways that people put themselves at risk for security breaches? How could these security risks be minimized?

REPLY TO RESPONSES 75-100 WORDS

A Sergio Garcia

Common ways that many people put themselves at risk for security breaches are providing too much information on the internet, downloading apps, emails, anytime an unsecured website is accessed. People tend to rely on their electronics for almost everything. They can use their phones to make calls, send emails, text messages, use coupons, download bank apps. This also provides vulnerabilities to that device because if they are using that specific device to an unsecured network it could cause for an attack or if whatever they are using the device for releases an attack that’s also room for disaster. A simple text message with a link could cause an attack. Many attackers use the fact that people rely on electronics to much to their advantage to gain information. It’s always important to add security features such as password protection and two factor authentication to all electronics and to secure personal information as well.

B Jose Juarez

From what I have learned up until now, is to protect your self and your devices. Every time you connect to the internet, you leave a trail of yourself while you surf the web, make purchases and things like that. It is always best to understand security procedures and learn proper etiquette. Like changing passwords, restricted access to users, encrypt your data within the network, protect your service set identifier (SSID), use a firewall, antivirus, sharing information (security), make sure software patches are updated, VPN, and check your ISP (internet service provider) or router for any advance security features or services. I think the most common one is email phishing and social engineering in the work environment. Always be aware of your surroundings and any suspicious activity.

C Marcelino Del Bosque

A simple yet effective way to mitigate security risk is to keep your software up to date. Updates offer security patches which fix known deficiencies in products that hackers can use to infiltrate your devices or network. New security features make your network more secure and less desirable for attackers to attempt to compromise. Hackers who are successful can steal data, encrypt your files or prevent your device from working at all. Most OS support automatic updates once it’s been enabled. In addition, automatic updates may only take place in certain conditions such as the device is connected to Wi-Fi, connected to power, powered on at a specific time of day, has sufficient storage, and/or isn’t too far out of date. These will be some things to check for in order to download the newest updates.

error: Content is protected !!