Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

From the learner's perspective, one key advantage of having accessibility to many of the latest gadgets and gizmos is that it organically creates an ecosystem

From the learner's perspective, one key advantage of having accessibility to many of the latest gadgets and gizmos is that it organically creates an ecosystem to experience and practically study various technologies and principles.
Not too long ago, if you wanted to even remotely sense how some piece of technology or a security principle works in real life, you had to invest in expensive and complex equipment. Fortunately, that is not the case today. There is an excellent chance that, just in your home network right now, you have pieces of hardware and software invisibly operating and implementing many of the network and security principles you are learning in this module.
Furthermore, unfortunately, a common misconception among many home users regarding the security of their networks is that it is either too small to be at risk of a cyber attack or that the devices are made adequately secure by the manufacturer.
The reality is that most attacks are not personal and can happen on any network regardless of whether its home or business. Additionally, typically manufacturers optimize default configurations for functionality, ease of use, and performance, rather than security.
For this activity:
Take an inventory of the devices connected to your home network, such as computers, smartphones, smart TVs, baby monitors, and security cameras.
Then, investigate the network components that enable these devices to operate, intercommunicate, and access the internet. Examples of these include network cables, modems, routers, and Wi-Fi range extenders.
Finally, share the various security measures you have implemented, particularly on your home network components.
Review the links in the resource section and highlight practices you already had implemented. Why had you already implemented them?
Are there any configurations that you modified as a result of this activity? If not, why not? If yes, how was your experience making the change and the subsequent impact on the network's performance or functionality?
Share your thoughts on how home network security practice translates to an enterprise network? How can you use your home security experience to demonstrate your hands-on experience to future employers?

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

MySQL/PHP Database Applications

Authors: Brad Bulger, Jay Greenspan, David Wall

2nd Edition

0764549634, 9780764549632

More Books

Students also viewed these Databases questions

Question

Can workers be trained in ethics? How? Defend your answer.

Answered: 1 week ago