1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
faust18 [17]
3 years ago
9

Is the wireless network you own as secure as it should be? Examine your wireless network or that of a friend or neighbor and det

ermine which security model it uses. Next, outline the steps it would take to move it to the next highest level. Estimate how much it would cost and how much time it would take to increase the level. Finally, estimate how long it would take you to replace all the data on your computer if it was corrupted by an attacker, and what you might lose. Would this be motivation to increase your current wireless security model? Write a one-page paper on your work
Computers and Technology
1 answer:
AleksandrR [38]3 years ago
3 0

Answer:

See explaination

Explanation:

Wireless Security:

In a bid to examine the network you can use ipconfig /all command in windows or in the event where you are a linux user type in ifconfig to view all the configuration details of your network such as

indows IP Configuration

Host Name . . . . . . . . . . . . : myvpc-hb

Primary Dns Suffix . . . . . . . : example.com

Node Type . . . . . . . . . . . . : Hybrid

IP Routing Enabled. . . . . . . : Yes

Ethernet adapter Local Area Connection:- - - - - -

Connection-specific DNS Suffix . :- - - - - -

Description . . . . . . . . . . : Intel 68540-Based PCI Express Fast Ethernet Adapter

Physical Address. . . . . . . . . : 00-03-AA-BC-CA-8F

Autoconfiguration Enabled . . . . : Yes

Link-local IPv6 Address . . . . . : fe65::ab56:ccb9:320c:524d%8(Preferred)

IPv4 Address. . . . . . . . . . . : 192.168.45.111(Preferred)

Default Gateway . . . . . . . . . : 192.168.15.1

DHCP Server . . . . . . . . . . . : 192.168.15.1

DHCPv6 IAID . . . . . . . . . . . : 201327615

Note: If you want to deeply examine the your network and to find security model go with Wireshark application.It will help you to capture the data packets easily using GUI.Also it will provide other details like transmission control protocols,etc.

To take your network to highest level i.e. to make it more secure you can use:

1.Firewalls like application gateways,packet filtering,hybrid systems.

2.Crypto cable routers

3.Virtual private networks, etc.

Estimation of cost and the time to increase the level is solely depends on the type of the architecture you want to use for the network building structure.Also the size of the network will be responsible for the cost and time.

In case of any attack on your computer it depends on the size of the data on the computer disc and the bandwidth of the network to which your computer is connected to replace all data. The faster the bandwidth of the network,faster the data replacement rate.

You might be interested in
Provide examples of the cost of quality based on your own experiences
Phoenix [80]

Answer:

Cost of quality is define as methodology which basically decide the cost of product and services in an organisation and company. It also determine all the cost which are associated with the quality.

The cost of quality basically divided into four categories that are:

  • Appraisal
  • Prevention
  • External failure
  • Internal failure

Example of the cost of quality is that, in oil refinery industry if the growth of product increased then, the company state also increased. In same way, if there is decrease in the refining state of the product then, the growth of product automatically reduced.

3 0
3 years ago
When is the following expression true? (2 points)
ipn [44]

Answer:

1) If and only if a and b have different values

Explanation:

Given

Expression: !(!a || b) || (!a && b)

Required

When is it true?

The expression is true when the values a and b are different and the proof is as follows.

(1) Assume that: a = true and b = false

!(!a || b) || (!a && b)  

= !(!true || false) || (!true && false)

!true = false, so the expression becomes:

= !(false|| false) || (false && false)

In boolean, false|| false = false and false && false = false. So, we have:

= !(false) || (false)

!(false) = true, so, the expression becomes:

= true || (false)

Lastly, true || false = true

(2) Assume that: a = false and b = true

!(!a || b) || (!a && b)  

= !(!false|| true) || (!false && true)

!false = true, so the expression becomes:

= !(true|| true) || (true && true)

In boolean, true|| true = true and true && true = true. So, we have:

= !(true) || (true)

!(true) = false, so, the expression becomes:

= false|| true

Lastly, false || true = true

<em>This expression is false if a and b have the same value</em>

4 0
3 years ago
To have a set of command
GalinKa [24]

Every program that interacts with people responds to a specific set of commands. The set of commands and the syntax for entering them is called the user interface and varies from one program to another. The DOS operating system makes a distinction between internal and external commands.

3 0
3 years ago
Write a program that prompt the user to enter a bank balance. The balance entered by the user is read into a variable named bala
IRINA_888 [86]

Answer:

ertyuiopoijuhgfdsa hiyoufun tresdfghytrefgytredfg

Explanation:

look for the words

4 0
3 years ago
So if brainly teaches me better why do we even have real life teachers??????
Katarina [22]

Answer:

i dont know maybe becuse the l.a.w says so?

Explanation:

7 0
3 years ago
Other questions:
  • When federal courts are evaluating digital evidence from computer-generated records, what exception is applied to hearsay?'
    13·1 answer
  • When should you check to see that fuel lines, connections, and fuel vents are in good condition?
    7·1 answer
  • What is the curriculum of digital literacy
    6·1 answer
  • When using a graphics editing program, which option allows you to adjust the space around an image?
    15·1 answer
  • The picture that graphically represents the items you use in Windows is called a/an
    12·2 answers
  • A Programmer uses what piece of software?*
    12·1 answer
  • True or false: in order to keep yourself and co workers safe, you must be able to recognize electrical hazards
    8·2 answers
  • Use Python.
    7·1 answer
  • Notebook is the answer
    9·2 answers
  • Before radio, many minority musicians were severely limited by the prejudice of the era. true o rfalse
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!