Answered step by step
Verified Expert Solution
Question
1 Approved Answer
From the learner's perspective, one key advantage of having accessibility to many of the latest gadgets and gizmos is that it organically creates an ecosystem
From the learner's perspective, one key advantage of having accessibility to many of the latest gadgets and gizmos is that it organically creates an ecosystem to experience and practically study various technologies and principles.
Not too long ago, if you wanted to even remotely sense how some piece of technology or a security principle works in real life, you had to invest in expensive and complex equipment. Fortunately, that is not the case today. There is an excellent chance that, just in your home network right now, you have pieces of hardware and software invisibly operating and implementing many of the network and security principles you are learning in this module.
Furthermore, unfortunately, a common misconception among many home users regarding the security of their networks is that it is either too small to be at risk of a cyber attack or that the devices are made adequately secure by the manufacturer.
The reality is that most attacks are not personal and can happen on any network regardless of whether its home or business. Additionally, typically manufacturers optimize default configurations for functionality, ease of use, and performance, rather than security.
For this activity:
Take an inventory of the devices connected to your home network, such as computers, smartphones, smart TVs baby monitors, and security cameras.
Then, investigate the network components that enable these devices to operate, intercommunicate, and access the internet. Examples of these include network cables, modems, routers, and WiFi range extenders.
Finally, share the various security measures you have implemented, particularly on your home network components.
Review the links in the resource section and highlight practices you already had implemented. Why had you already implemented them?
Are there any configurations that you modified as a result of this activity? If not, why not? If yes, how was your experience making the change and the subsequent impact on the network's performance or functionality?
Share your thoughts on how home network security practice translates to an enterprise network? How can you use your home security experience to demonstrate your handson experience to future employers?
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started