End-user Computer Security/Main content/Wireless Communications

From Wikibooks, open books for an open world
Jump to navigation Jump to search
Electronic-security artwork (lock & circuit-board patterns).jpg
=𓆉

End-user Computer Security
Inexpensive security

for   

individuals
sole traders
small businesses

Wireless CommunicationsExtlink for End-user Computer Security book -4.svg  /  Chapter 3
[edit]

⬆ Up-vote section | Wireless Communications (chapter 3) ⬇ Down-vote section | Wireless Communications (chapter 3)

If internet connection is hacked, computers will become vulnerable. Although maintaining security on the user's machine will probably mean that security overall will be sufficiently maintained, it is still worthwhile safeguarding against such an event.

WiredExtlink for End-user Computer Security book -B5.svg vs. wirelessExtlink for End-user Computer Security book -B5.svg[edit]

⬆ Up-vote section | Wired vs. wireless ⬇ Down-vote section | Wired vs. wireless

Whenever there is a choice between wired or wireless communication (such as in the case of wired tethering for internet connections), wired communication is likely going to be more secure; it appears that most wireless routers usefully also permit wired ethernet connections.

Shared WiFiExtlink for End-user Computer Security book -B5.svg[edit]

⬆ Up-vote section | Shared WiFi ⬇ Down-vote section | Shared WiFi

It's best not to use a shared WiFi router at all, if it can be helped; or if it is used, only to use it with a highly secure client-machine set-up. When a router is shared, it can be difficult to convince others about the need to perform certain security tasks, such as the changing of the WiFi password on a regular basis. Essex police’s cyber-security advice as of March 2020, was not to use free WiFi for anything you wouldn’t want a stranger to see.

Keep communicationExtlink for End-user Computer Security book -B5.svg systems turned off[edit]

⬆ Up-vote section | Keep communication systems turned off ⬇ Down-vote section | Keep communication systems turned off

Keeping WiFi, Bluetooth and NFC disabled when not in use, is a good precautionary security measure.


Previous chapter: chapter 2, entitled 'Passwords and digital keys'

Chapter 2
Passwords and digital keys
Go to page for contents, index, and foreword

Contents, Index, Foreword

Chapter 4
Digital storage
Next chapter: chapter 4, entitled 'Digital storage'