Week 9 discussion | Computer Science homework help

 You’re working for a local coffee shop that offers free wireless access to customers. Your supervisor has asked you to create a flyer for patrons that warns them of the potential dangers of surfing the Internet in public places. Conduct research on the Internet about using public hotspots to access the Internet. Prepare a list of specific steps that customers can take to protect their data when surfing on publicly accessible networks. 
Reply- Shiva
 
Data security should not be compromised. Nowadays, there are very many individuals and businesses complaining of how they lost their data or how their accounts got hacked into. Using public WIFI hotspots can expose a user to very many risks such as cyber-attacks. However, there are measures that users can take to prevent the risks.
Use a Virtual Private Network (VPN) to access the internet when using public Wi-Fi. This type of connection conceals your identity and information by highly encrypting your data (Kaspersky, n.d.). This makes it really hard for hackers to penetrate and steal user data. On top of that, visit sites with HTTPS. Unlike the HTTP connections, the HTTPS offers encryption which is useful in data protection (Nielo, 2018). By using HTTPS other people who are using the same network cannot spy on or track your data when you browse.
In addition, do not share too much of your personal details when asked to sign in to a network. Some Wi-Fi networks may require you to sign in before using the networks. Giving your email, identity card number or contact details might put you into risks (We Live Security, 2015). It is better to refrain from using such networks. The other step is to turn off completely or limit sharing. This means that you restrict your device from being discovered by other devices. In this way, other people will not share malicious files with you or access your files.
You should also install security software that can protect your data. This software help to detect insecure connections and malicious files. It is also recommendable to analyze the terms and conditions for using the Wi-Fi to see what the consequences of signing up are. If you discovered flags, refrain from joining the network. Lastly, disconnect the Wi-Fi whenever it is not needed. This bars any further communication that could harm you.
References
Kaspersky. (n.d.). How to Avoid Public WiFi Security Risks. Retrieved October 26, 2018, from https://www.kaspersky.com/resource-center/preemptive-safety/public-wifi-risks
Nielo, D. (2018, August 5). Simple Steps to Protect Yourself on Public Wi-Fi. Retrieved October 26, 2018, from https://www.wired.com/story/public-wifi-safety-tips/
We Live Security. (2015, September 2). 10 steps to staying secure on public Wi-Fi. Retrieved October 26, 2018, from https://www.welivesecurity.com/2015/09/02/10-steps-staying-secure-public-wi-fi/
Reply- Sheshani
 
Open Wi-Fi is naturally unbound. Specialists caution against making any monetary exchanges or utilizing Visas on open Wi-Fi, which can give personality cheats the data they have to go on a shopping binge with your cash. Tap on the thumbnail picture at the highest point of this story to watch a video showing of how programmers can watch your proceeds onward unbound systems and tips for utilizing open Wi-Fi. Web shopping (on open Wi-Fi) is an awful thought. A few specialists even prompt against browsing Facebook or email represents a similar reason, in light of the fact that an excess of data can be presented to programmers that enables them to utilize programs that figure passwords, access data and take a man’s character. The greatest risk is on open, open Wi-Fi systems that don’t require a secret key.
It isn’t that Wi-Fi suppliers are unconscious or couldn’t care less about the threats. The Monmouth County Library framework’s Wi-Fi strategy cautions clients that their data isn’t secured. Different issues incorporate clients trusting they are associating with the real Wi-Fi arrange when they are truly interfacing with a “rebel passageway, Users are coordinated to an authentic looking site that prompts them to give data, for example, charge card numbers.
Other safety efforts incorporate killing all record, printer and any sharing uses, which an outsider can use to get to your PC. In the event that your PC has firewalls, utilize them to anticipate spontaneous approaching interchanges. Consider empowering “two factor” verification on each site, which requires a “second sign in” of a code messaged or messaged to a record you have assigned, he said. “On the off chance that you sign in from an alternate IP (Internet supplier) address that is not remembered, it will provoke you to re-sign in once more. A solid, arbitrary secret phrase, changed frequently, is a critical guard, Clark said. Avoid utilizing any referred to lexicon words and make passwords the same number of characters as a site will permit. Utilize a secret key director to store, create and recall the passwords for you, yet you will require one “great ace secret word” to open it. Take the longest secret key permitted. Make it arbitrary and alphanumeric in the event that they know anything about you, they can develop your secret key. The speculating is finished by “word reference assault” projects and PCs fit for creating a billion secret phrase varieties one moment to discover one that works.
REFERENCES
U. of Edinburgh Information Services. http://www.ed.ac.uk/schools-departments/information-services/services/research-support/data-library/research-data-mgmt/storage-backup
Zyskind, G., & Nathan, O. (2015, May). Decentralizing privacy: Using blockchain to protect personal data. In Security and Privacy Workshops (SPW), 2015 IEEE (pp. 180-184). IEEE.
Nilsson, C., & Berggren, K. (2000). Alterations of riparian ecosystems caused by river regulation: Dam operations have caused global-scale ecological changes in riparian ecosystems. How to protect river environments and human needs of rivers remains one of the most important questions of our time. AIBS Bulletin, 50(9), 783-792.

 

“#“”

Essay Writing Service

Order a similar paper and get 15% discount on your first order with us

Dr. Padma Myers
Dr. Padma Myers
98% Success Rate
Read More
“Hello, I deliver nursing papers on time following instructions from the client. My primary goal is customer satisfaction. Welcome for plagiarism free papers”
Stern Frea
Stern Frea
98% Success Rate
Read More
Hi! I am an English Language and Literature graduate; I have written many academic essays, including argumentative essays, research papers, and literary analysis.
Dr. Ishid Elsa
Dr. Ishid Elsa
98% Success Rate
Read More
"Hi, count on me to deliver quality papers that meet your expectations. I write well researched papers in the fields of nursing and medicine".
Dr. Paul P. Klug
Dr. Paul P. Klug
99% Success Rate
Read More
"A top writer with proven reliability and experience. I have a 99% success rate, overall rating of 10. Hire me for quality custom written nursing papers. Thank you"

How Our Essay Writing Service Works

Tell Us Your Requirements

Fill out order details and instructions, then upload any files or additional materials if needed. Then, confirm your order by clicking “Place an Order.”

Make your payment

Your payment is processed by a secure system. We accept Mastercard, Visa, Amex, and Discover. We don’t share any informati.on with third parties

The Writing Process

You can communicate with your writer. Clarify or track order with our customer support team. Upload all the necessary files for the writer to use.

Download your paper

Check your paper on your client profile. If it meets your requirements, approve and download. If any changes are needed, request a revision to be done.

Recent Questions

Stay In Touch!

Leave your email and get discount promo codes and the best essay samples from our writers!