cyber Chpt 5

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Describe how you set up your mobile device (e.g., smartphone) to maximize security

Disable Unused Features: It is important to disable unused features and turn off those that do not support the business use of the device or that are rarely used. Enable a Lock Screen: Doing this can prevent your mobile device from being used until the user enters the correct password.

Describe the steps in securing a home Wi-Fi router

Enabling Remote Management: This permits users access to the router's configuration settings from another location thru the internet. It is recommended that this feature is disabled because it adds a stronger degree of security because it is limiting access to the configuration settings of the wireless router to only the local computer connected to it.

List five security risks associated with the use of mobile devices

Installing Unsecured Apps: Downloading unsecured apps can often lead to apps without reliable security. Limited Physical Security: In addition to loss or theft, merely using a mobile device in a public area can be considered a risk. Connecting to Public Networks: If proper security is not implemented, attackers can eavesdrop on the data transmissions and view sensitive info. Location Tracking: These mobile devices are at increased risk of targeted physical attacks because an attacker can easily determine where the user and the mobile device are located. Accessing Untrusted Content: A QR can store website URLs, plain text, phone numbers, emails, or any alphanumeric data up to 4296 characters.

What is Bluetooth technology? List the risks associated with the use of Bluetooth

It is a form of wireless technology, it is a short-range wireless technology designed for quick pairing or interconnecting of two or more devices together. Risks---- Bluejacking: an attack that sends unsolicited messages to Bluetooth-enabled devices. Bluesnarfing: An attack that accesses unauthorized info from a wireless device thru a Bluetooth connection, often between cell phones and laptops.

List four types of attacks Wi-Fi networks face

Reading wireless transmissions: Usernames, passwords, credit card numbers, and other information sent over the WiFi network could be easily seen by an attacker. Viewing or stealing computer data: An attacker who is able to connect to a home WiFi network could access any folder that has file sharing enabled on any computer on the network. Injecting Malware: Bc attackers might access the network behind a firewall, they could inject Trojans, viruses, and other malware onto other users' computer. Downloading harmful content: In several instances, attackers have accessed a home computer through an unprotected WiFi network, downloaded child pornography to the computer, and then turned the computer into a file server to distribute the content.

List and describe the sound practices when using a public Wi-Fi network

Watch for an evil twin: Attackers often like to impersonate a legit WiFi network by creating their own lookalike networks. Limit the type of activity: It is wise to simply just web surf or watch videos online. Use a VPN: This uses an unsecured public network, such as the internet, as if it were a secure private network.

How can you configure Bluetooth to maximize its security?

When using a smartphone or a tablet that supports Bluetooth, it is advisable to disable Bluetooth and turn on this service only if it is necessary.

Describe Wi-Fi. List the equipment needed for a Wi-Fi network

WiFi is a technology that uses radio waves to provide network connectivity. A WiFi connection is established using a wireless adapter to create hotspots - areas in the vicinity of a wireless router that are connected to the network and allow users to access internet services. Wireless Router - A wireless router is needed so that it can take the information sent by the modem and "route" it to your wireless device(s). Modem - If this is your first internet connection you'll need to buy a modem.


Ensembles d'études connexes

Chapter 18 Bone and Joint Problems (EVOLVE ch 49/51 med/surg)

View Set

Chapter 1 Pre-Work/Quiz CIST-004A

View Set

8. The Berlin Blockade (Cold War)

View Set

Chapter 36- abdominal and Genitourinary trauma

View Set

과목 3 수렵도구의 사용법 / 1종: 평가영역 1 수렵용 총기에 대한 기본

View Set