I don’t understand this Writing question and need help to study.
Answer to this question.
It what ways can you as an Information Security Professional lock down and secure your home Wifi?
Note- please be on time,plagiarism all in APA format
SECURING HOME WIFI 1 Securing Home Wifi Institutional Affiliation Date SECURING HOME WIFI 2 Home Wi-Fi networks are prone to security attacks from potential threats. Home networks which allow guest users in order to ensure more than one device is connected to the same Wifi network will be prone to security attacks if one of the guest users will have malevolent intent where the other involved devices will be attacked. The shared files and other data which were shared through the use of the network will also suffer from the security attack especially if there is a malware on one of the devices which further spread to the other devices sharing the same network. However, as an information security professional, the home Wi-Fi network security can be improved in various ways in order to prevent the spreading of malware infecting the devices and the shared information (Wang, 2009). One way which can prevent the infecting and the security attack on the network will be related to the isolation of the guest log-ins where a guest zone will have to be created. The guest will only have access to a guest network as a guest and will be isolated from the other devices. This solution is referred to as wireless isolation. The creation of a guest network will, however, be highly disadvantageous since the sharing of files and folders will be limited since the guest will be isolated (Luk, 2009). Additionally, the Wi-Fi router settings can be configured since the normal settings may provide the holes needed for hackers to exploit the network. So, as a defense strategy, the Wi-fi router settings will include the turning on the firewall which will ensure that the unwanted network traffic does not affect a person’s home network. The remote administration which helps the network owner to have the advantage of configuring settings in a distance will create an opportunity for hackers do the same without the knowledge of the network owner. SECURING HOME WIFI 3 The password of the network and especially in situations where it has been set to default should be changed to ensure that the home network is safe since the hackers will use the default settings to gain entry to the network. In addition to the change of the password which was set to default, the IP address which has also been set to default should also be changed which will ensure the configuration setting of the home Wi-Fi router is hidden from the hackers. Home Wi-Fi network owners are encouraged to use a stronger encryption which will hinder any security attacks on the network. The strongest encryption will be WPA2 while the weakest will be WEP (Luo, 2002). Infiltration of the network may occur through the use of smart devices which are all connected to the same router with some have no form of security configuration which will lead to a security breach of the network. Two routers to cater to the small devices and other devices connected to the network. This will prevent the breach of the network from ever occurring. Furthermore, boosting the security of your home network will help lock and secure one’s Wi-Fi network. One measure of security would be through the use of Intrusion Detection & Protection firewall which will help with the prevention of any intrusions that will attack one’s home network ensuring that the network is secure. Use of an antivirus will help protect the network from malware which will infect the devices connected to the same network and leave holes for security attacks (Deniszczuk, 2006). SECURING HOME WIFI 4 References Henry, P. S., & Luo, H. (2002). WiFi: what’s next?. IEEE Communications Magazine, 40(12), 66-72. Hottell, M. P., Carter, D., & Deniszczuk, M. (2006, June). Predictors of Home-Based Wireless Security. In WEIS. Wang, X., Feng, Z., & Luk, K. M. (2009). Pattern and polarization diversity antenna with high isolation for portable wireless devices. IEEE antennas and wireless propagation letters, 8, 209-211. Woon, I., Tan, G. W., & Low, R. (2005). A protection motivation theory approach to home wireless security. ICIS 2005 proceedings, 31. …
Purchase answer to see full attachment
Do you have a similar assignment and would want someone to complete it for you? Click on the ORDER NOW option to get instant services at essayloop.com