1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ivanzaharov [21]
3 years ago
10

Why do attackers tend to target public or private Wi-fi networks?

Computers and Technology
1 answer:
Anika [276]3 years ago
5 0

Answer:

The answer to this question is given below in this explanation section.

Explanation:

A free WiFi connection in a public space can seem like a lifesaver when you are on the go.But if you decide to use public WiFi just be aware that you could be making yourself an easy target for hackers and putting your information and more at risk.

one of the dangers of using a public WiFi network is that data over this type of open  connection is often encrypted and  unsecured ,leaving you vulnerable to a man in the middle attack.It when a cyber criminal exploits a security  flaw in the network to intercept data

  • Avoid connecting to public WiFi connection. i if you must use a public WiFi hotpots also use a virtual privater network to secure your connection.
  • Do not  log in to password protected websites that contains sensitive information when using a public WiFi connection for example banking and social networking sites or even email.
  • Keep your software patched and up to date and all your devices even your mobiles ones to avoid any potential infection by viruses or malware if you do use unsecured public WiFi.

You might be interested in
What stage of software development incorporates planning to help make changes in the project plan based of reviews
larisa86 [58]

Answer:

A

Explanation:

8 0
3 years ago
For the question below, refer to the following recursive factorial method.
Mashcka [7]

Answer:

(d) 6

Explanation:

When we call factorial(3) first it will check if it greater than 1 since it is greater then return 3*factorial(2) will be called on factorial(2) it will again check that 2>1 since it is greater then return 2*factorial(1) will be called.In factorial(1) we have is not greater than 1 so it will return 1.return 2*factorial(1) will return 2 and 2 that is returned by factorial(2) will be multiplied with 3.So it will return 6.

8 0
4 years ago
The home keys on the numeric keypad are?
Eva8 [605]
4, 5 , 6 , and plus key
456+
5 0
3 years ago
Read 2 more answers
The ________ program displays graphics and loading screens during the boot process.
Minchanka [31]
Booting would be complete if the normal, runtime environment has been achieved. A boot loader is a program that loads operating system for the computer after the completion of power on tests. The boot manager is a program that displays graphics and loading screens during the boot process.
3 0
3 years ago
4. _______ are miniature versions of the slides in a presentation. A. ScreenTips B. Thumbnails C. Window controls D. Shapes
Ber [7]
B.
Thumbnails is correct
6 0
4 years ago
Read 2 more answers
Other questions:
  • The purpose of the _____ element is used to configure the footer information ona web page document
    6·1 answer
  • Which class of fire extinguisher is appropriate for a fire involving electrical/energized electrical equipment?
    13·2 answers
  • When preparing to communicate a solution to a design problem, you must:?
    5·1 answer
  • Nonverbal messages from the movie it​
    5·2 answers
  • what programs controls all operations of the computer hardware such as memory storage devices or printers and provides for you t
    7·1 answer
  • Is phone data used when connected to wifi
    12·1 answer
  • "Why learning how to type is so important.
    7·1 answer
  • Can anyone please help?
    13·1 answer
  • User name ideas for ro blox? I'm changing mine and I dont know what I want. No numbers or underscores!
    10·2 answers
  • The probability of event A occurring is 10/10. The probability of event B occurring is 0/10. What is the entropy of this system?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!