End-user Computer Security/Main content/Wireless Communications

From Wikibooks, open books for an open world
Jump to navigation Jump to search

=𓆉

End-user Computer Security
Inexpensive security

for   

individuals
sole traders
small businesses

Wireless Communications  /  Chapter 3
[edit | edit source]

⬆ Up-vote section | Wireless Communications (chapter 3) ⬇ Down-vote section | Wireless Communications (chapter 3)

If internet connection is hacked, computers will become vulnerable. Although maintaining security on the user's machine will probably mean that security overall will be sufficiently maintained, it is still worthwhile safeguarding against such an event.

Wired vs. wireless[edit | edit source]

⬆ Up-vote section | Wired vs. wireless ⬇ Down-vote section | Wired vs. wireless

Whenever there is a choice between wired or wireless communication (such as in the case of wired tethering for internet connections), wired communication is likely going to be more secure; it appears that most wireless routers usefully also permit wired ethernet connections.

Shared WiFi[edit | edit source]

⬆ Up-vote section | Shared WiFi ⬇ Down-vote section | Shared WiFi

It's best not to use a shared WiFi router at all, if it can be helped; or if it is used, only to use it with a highly secure client-machine set-up. When a router is shared, it can be difficult to convince others about the need to perform certain security tasks, such as the changing of the WiFi password on a regular basis. Essex police’s cyber-security advice as of March 2020, was not to use free WiFi for anything you wouldn’t want a stranger to see.

Keep communication systems turned off[edit | edit source]

⬆ Up-vote section | Keep communication systems turned off ⬇ Down-vote section | Keep communication systems turned off

Keeping wireless technologies such as WiFi, Bluetooth, NFC, and infrared ports, disabled when not in use, is a good precautionary security measure.


Previous chapter: chapter 2, entitled 'Passwords and digital keys'

Chapter 2
Passwords and digital keys
Go to page for contents, index, and foreword

Contents, Index, Foreword

Chapter 4
Digital storage
Next chapter: chapter 4, entitled 'Digital storage'