The Home Internet and Network Security Essay

Exclusively available on IvyPanda Available only on IvyPanda
Updated:

In the present day, one hardly imagines his life without having the Internet at home. The majority of Internet service providers currently offer an integrated access device that unites all home devices into one network connected to the world. At the same time, if not secured properly, this integrity may create multiple safety concerns related to data confidentiality. This paper addresses the essential aspects of network security analysis for the home Internet. The customers are students who use Internet connection for study, communication, and entertainment, and the safety of their personal data should be considered.

We will write a custom essay on your topic a custom Essay on The Home Internet and Network Security
808 writers online

First of all, the type of network defines its security – thus, wired networks are typically more secure in comparison with wireless ones. While a wired network is administered only through a physical connection within the building, the Wi-Fi signal of wireless networks may be available to the public outside the facility. In addition, system security should be considered as well – in this case, the reliability of passwords, the latest firmware, and the availability of website filtering should be assessed (Center for Internet Security par. 8). In addition, some Internet providers offer network-based security options for additional protection against infected files and malicious URLs.

As unexpected circumstances may lead to data losses, it is essential to evaluate the availability of options for data backup and recovery, such as cloud services, along with tools for protection, including an uninterruptable power supply or a surge protector. For physical security, current hardware should be used to ensure the absence of its vulnerability. For authorization, authentication, or accounting, which creates additional security concerns, a multi-factor approach and reliable passwords should be applied. Finally, users should be aware of security threats on the Internet to avoid them as well.

Thus, in order to analyze the security of customers’ home Internet, the wireless range analysis may be applied to evaluate the scope of a potential threat in the case of wireless connection, along with internal or external port scanning and the development of a remediation plan for the detection of security-related vulnerabilities. In addition, several specific questions may be posed to the customer, including the following:

  • When did you buy the router, was it provided by your Internet company?
  • Is your Wi-Fi access secured by a password?
  • How many levels of authorization do you have?
  • Do you use cloud services?
  • Have you received suspicious emails within the last several weeks?

Work Cited

Center for Internet Security. “.” Center for Internet Security, vol. 17, no. 2. Web.

Print
Need an custom research paper on The Home Internet and Network Security written from scratch by a professional specifically for you?
808 writers online
Cite This paper
Select a referencing style:

Reference

IvyPanda. (2024, February 24). The Home Internet and Network Security. https://ivypanda.com/essays/the-home-internet-and-network-security/

Work Cited

"The Home Internet and Network Security." IvyPanda, 24 Feb. 2024, ivypanda.com/essays/the-home-internet-and-network-security/.

References

IvyPanda. (2024) 'The Home Internet and Network Security'. 24 February.

References

IvyPanda. 2024. "The Home Internet and Network Security." February 24, 2024. https://ivypanda.com/essays/the-home-internet-and-network-security/.

1. IvyPanda. "The Home Internet and Network Security." February 24, 2024. https://ivypanda.com/essays/the-home-internet-and-network-security/.


Bibliography


IvyPanda. "The Home Internet and Network Security." February 24, 2024. https://ivypanda.com/essays/the-home-internet-and-network-security/.

Powered by CiteTotal, best citing machine
If you are the copyright owner of this paper and no longer wish to have your work published on IvyPanda. Request the removal
More related papers
Updated:
Cite
Print
1 / 1