The Home Internet and Network Security

Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)

NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.

NB: All your data is kept safe from the public.

Click Here To Order Now!

In the present day, one hardly imagines his life without having the Internet at home. The majority of Internet service providers currently offer an integrated access device that unites all home devices into one network connected to the world. At the same time, if not secured properly, this integrity may create multiple safety concerns related to data confidentiality. This paper addresses the essential aspects of network security analysis for the home Internet. The customers are students who use Internet connection for study, communication, and entertainment, and the safety of their personal data should be considered.

First of all, the type of network defines its security – thus, wired networks are typically more secure in comparison with wireless ones. While a wired network is administered only through a physical connection within the building, the Wi-Fi signal of wireless networks may be available to the public outside the facility. In addition, system security should be considered as well – in this case, the reliability of passwords, the latest firmware, and the availability of website filtering should be assessed (Center for Internet Security par. 8). In addition, some Internet providers offer network-based security options for additional protection against infected files and malicious URLs.

As unexpected circumstances may lead to data losses, it is essential to evaluate the availability of options for data backup and recovery, such as cloud services, along with tools for protection, including an uninterruptable power supply or a surge protector. For physical security, current hardware should be used to ensure the absence of its vulnerability. For authorization, authentication, or accounting, which creates additional security concerns, a multi-factor approach and reliable passwords should be applied. Finally, users should be aware of security threats on the Internet to avoid them as well.

Thus, in order to analyze the security of customers’ home Internet, the wireless range analysis may be applied to evaluate the scope of a potential threat in the case of wireless connection, along with internal or external port scanning and the development of a remediation plan for the detection of security-related vulnerabilities. In addition, several specific questions may be posed to the customer, including the following:

  • When did you buy the router, was it provided by your Internet company?
  • Is your Wi-Fi access secured by a password?
  • How many levels of authorization do you have?
  • Do you use cloud services?
  • Have you received suspicious emails within the last several weeks?

Work Cited

Center for Internet Security. “.” Center for Internet Security, vol. 17, no. 2. Web.

Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)

NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.

NB: All your data is kept safe from the public.

Click Here To Order Now!