networking multi-part question and need the explanation and answer to help me learn.
Purpose: A computer network is two or more computing devices that are connected together and can communicate data electronically. The Internet is a network of networks that allows computers all over the world to pass information. However, being connected allows the possibility that malicious actors can access information for nefarious purposes. The purpose of this assignment is to learn about the risks associated with being connected to the Internet and steps you can take to mitigate the risks.
Tasks
Task 1: Problem identification. Research some of the common threats to computer networks. What are the threats? How do they occur? What are the impacts to users when they do occur? Download and fill out Part 1 of the template provided.
Task 2: Solution. Research the products and procedures that help mitigate network risks including routers, passwords policies, security software, and backing up your data. Download and fill out Part 2 of the template provided.
Criteria:
Pts
40
Task 1 Problem Identification
15
Task 2a Router
15
Task 2b Passwords
15
Task 2c Security software
15
Task 2d Data backup
100
Total
Requirements: template
CPSC 1105
Name:
Semester:
Part 1. Problem identification
Part 2. Solution
It is important to keep your software and hardware up to date to patch any security vulnerabilities. The security of your modem and wireless router is particularly important. The modem is usually provided by your Internet service provider. Make sure you take the old modem in to exchange for an up to date model at least every 5 year. You may have the option to rent a router or you can purchase your own.
2a. Router
Read the following guide on purchasing a router:
Then research and find a router you would purchase.
Image:
URL:
Price:
Features:
Why did you purchase this router (use what you learned from the article)?
Always change the default password and wifi network name on your router. Enable encryption, the firewall, website filtering, and a guest network if these are available features. Consider disabling remote management if you don’t need it.
2b. Passwords
Your username and password is essential for protecting your accounts and personal information. Select hard to hack passwords. Hackers use brute-force password guessing and dictionary attacks. Another tactic is to use your social media and online presence to select words to use. People commonly use personal information such as birthdays, anniversaries, names (children, spouse, pets), etc. Rules for creating a good password often include having it over a certain length and to include both upper and lower case letters as well as numbers and characters. Try not to use dates or names that have a personal connection. Stanford University has a great infographic on secure password creation. Read it:
Following their rules create the following:
5 secure passwords:
5 insecure passwords:
Two factor authentication adds an extra layer of protection so use it whenever possible! In addition, hackers steal usernames and passwords from companies and sell them so it’s important to change your passwords regularly and not to reuse passwords across sites.
2c. Security Software
Read the following article:
Should you get antivirus software or antimalware software or both? Why? What is the difference between them?
2d. Data backup
We can’t prevent all disaster, so it’s important you prepare for the worst and backup all of your data. Read the following article:
Look at your devices. What data/files do you have that you wouldn’t want to lose? List here:
Of the options listed in the article, which backup method would work best for you? Why?