End-user Computer Security/Main content/Wireless Communications
End-user Computer Security
Inexpensive security
for |
⦾ individuals |
|
If internet connection is hacked, computers will become vulnerable. Although maintaining security on the user's machine will probably mean that security overall will be sufficiently maintained, it is still worthwhile safeguarding against such an event.
Wired vs. wireless[edit | edit source] |
|
Whenever there is a choice between wired or wireless communication (such as in the case of wired tethering for internet connections), wired communication is likely going to be more secure; it appears that most wireless routers usefully also permit wired ethernet connections.
Shared WiFi[edit | edit source] |
|
It's best not to use a shared WiFi router at all, if it can be helped; or if it is used, only to use it with a highly secure client-machine set-up. When a router is shared, it can be difficult to convince others about the need to perform certain security tasks, such as the changing of the WiFi password on a regular basis. Essex police’s cyber-security advice as of March 2020, was not to use free WiFi for anything you wouldn’t want a stranger to see.
Keep communication systems turned off[edit | edit source] |
|
Keeping wireless technologies such as WiFi, Bluetooth, NFC, and infrared ports, disabled when not in use, is a good precautionary security measure.
Chapter 2 Passwords and digital keys |
Chapter 4 Digital storage |
- Book:End-user Computer Security/Hash-tagged/#Communication/#Secure communication/#Secure downloading
- Book:End-user Computer Security/Hash-tagged/#Communication/#Secure communication
- Book:End-user Computer Security/Hash-tagged/#Communication
- Book:End-user Computer Security/Hash-tagged
- Book:End-user Computer Security
- Book:End-user Computer Security/Hash-tagged/#Privacy/#Electronic signals privacy
- Book:End-user Computer Security/Hash-tagged/#Privacy
- Book:End-user Computer Security/Hash-tagged/#Communication/#Secure communication/#Non-tampered communication
- Book:End-user Computer Security/Hash-tagged/#Tamper, tampering/#Tamper prevention
- Book:End-user Computer Security/Hash-tagged/#Tamper, tampering
- Book:End-user Computer Security/Hash-tagged/#Communication/#Wireless communication
- Book:End-user Computer Security/Book part/Main content/Chapters/«Wireless Communications», chapter 3
- Book:End-user Computer Security/Book part/Main content/Chapters
- Book:End-user Computer Security/Book part/Main content
- Book:End-user Computer Security/Book part
- Book:End-user Computer Security/Hash-tagged/#Physical security
- Book:End-user Computer Security/Hash-tagged/#Simple security measures
- Book:End-user Computer Security/Hash-tagged/#Security credentials/#Changing security credentials
- Book:End-user Computer Security/Hash-tagged/#Security credentials