The Home Internet and Network Security Essay

Exclusively available on Available only on IvyPanda® Made by Human No AI

In the present day, one hardly imagines his life without having the Internet at home. The majority of Internet service providers currently offer an integrated access device that unites all home devices into one network connected to the world. At the same time, if not secured properly, this integrity may create multiple safety concerns related to data confidentiality. This paper addresses the essential aspects of network security analysis for the home Internet. The customers are students who use Internet connection for study, communication, and entertainment, and the safety of their personal data should be considered.

First of all, the type of network defines its security – thus, wired networks are typically more secure in comparison with wireless ones. While a wired network is administered only through a physical connection within the building, the Wi-Fi signal of wireless networks may be available to the public outside the facility. In addition, system security should be considered as well – in this case, the reliability of passwords, the latest firmware, and the availability of website filtering should be assessed (Center for Internet Security par. 8). In addition, some Internet providers offer network-based security options for additional protection against infected files and malicious URLs.

As unexpected circumstances may lead to data losses, it is essential to evaluate the availability of options for data backup and recovery, such as cloud services, along with tools for protection, including an uninterruptable power supply or a surge protector. For physical security, current hardware should be used to ensure the absence of its vulnerability. For authorization, authentication, or accounting, which creates additional security concerns, a multi-factor approach and reliable passwords should be applied. Finally, users should be aware of security threats on the Internet to avoid them as well.

Thus, in order to analyze the security of customers’ home Internet, the wireless range analysis may be applied to evaluate the scope of a potential threat in the case of wireless connection, along with internal or external port scanning and the development of a remediation plan for the detection of security-related vulnerabilities. In addition, several specific questions may be posed to the customer, including the following:

  • When did you buy the router, was it provided by your Internet company?
  • Is your Wi-Fi access secured by a password?
  • How many levels of authorization do you have?
  • Do you use cloud services?
  • Have you received suspicious emails within the last several weeks?

Work Cited

Center for Internet Security. “.” Center for Internet Security, vol. 17, no. 2. Web.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2024, February 24). The Home Internet and Network Security. https://ivypanda.com/essays/the-home-internet-and-network-security/

Work Cited

"The Home Internet and Network Security." IvyPanda, 24 Feb. 2024, ivypanda.com/essays/the-home-internet-and-network-security/.

References

IvyPanda. (2024) 'The Home Internet and Network Security'. 24 February.

References

IvyPanda. 2024. "The Home Internet and Network Security." February 24, 2024. https://ivypanda.com/essays/the-home-internet-and-network-security/.

1. IvyPanda. "The Home Internet and Network Security." February 24, 2024. https://ivypanda.com/essays/the-home-internet-and-network-security/.


Bibliography


IvyPanda. "The Home Internet and Network Security." February 24, 2024. https://ivypanda.com/essays/the-home-internet-and-network-security/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
1 / 1