home

A network is a series of computers or IT devices interconnected which allow the users to share information. There are 2 main computer networks. Wireless and wired

Wireless This wireless conection works with a server, router and an anthena. Wireless connection are usually slower than wired, they are also less secure because information is sent everywhere.

Wired connections are those that are connected through a cable (ethernet) This is usually much more safe because the information passes only from the computer to the cable. Wired connection is faster than wireless.



The wifi connections (wireless) have SSID which is kind of the name of the network. E.g infinitum005739. They also have different types of encription like: WEP, none, WPA and WPAII. The most common one is WEP which is provided by Infinitum networks. Most motorola connections does not have any encription at all, this means that with a double click you can access that internet connection. WPA provides more security than WEP. a WPA example is: WifiADC in the school.  around the block we could not find any WPAII connection.

 Ways of increasing security  Having a WPA or WPAII increase a lot the security of the network.  Hidden the SSID is another ways of increasing security. it is important to recall that you need to have the SSID and the password (if it has) to connect to the network  To Have access to a wireless connection you need the SSID, to know the type of encryption (WEP; WAP; WAPII), and to know the password. A strong password should be one which contain 8 or more caracters, including symbols and capital letters. Some password searchers and hackers look for words on dictionaries and try them all, that is why it is not recommended to put a real words as a password. The hacker or the password searcher will then start trying combinations of all the symbols and characters to try hack your account however it can take ages to guess the password. <span style="display: block; font-family: Helvetica,helvetica,sans-serif;"> <span style="display: block; font-family: Helvetica,helvetica,sans-serif;"> <span style="display: block; font-family: Helvetica,helvetica,sans-serif;"> <span style="display: block; font-family: Helvetica,helvetica,sans-serif;"> <span style="display: block; font-family: Helvetica,helvetica,sans-serif;"> <span style="display: block; font-family: Helvetica,helvetica,sans-serif;"> <span style="display: block; font-family: Helvetica,helvetica,sans-serif;"> <span style="display: block; font-family: Helvetica,helvetica,sans-serif;"> .media type="youtube" key="rLx3k1BaWbw?fs=1" height="385" width="480" <span style="display: block; font-family: Helvetica,helvetica,sans-serif;"> <span style="display: block; font-family: Helvetica,helvetica,sans-serif;"><span style="color: #3c3d3f; font-family: Arial,Verdana; font-size: 14px; line-height: 20px;"> <span style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 14px; font-style: inherit; font-weight: inherit; margin-bottom: 10px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">__//Everything in today’s world relies on internet-be it communication, data transfer, information dissemination etc; everything is using www wire set up to travel and to reach from one place to another. __<span style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #e75f0d; font-family: inherit; font-size: 14px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">[|Cyber security] __ refers to procedure of safeguarding this data being transmitted from being attacked by intruders.//__ <span style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 14px; font-style: inherit; font-weight: inherit; margin-bottom: 10px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">__//****What are the risks involved?****//__ <span style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 14px; font-style: inherit; font-weight: inherit; margin-bottom: 10px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">__//There are many risks involved with cyber but they differ in degree of damage they can cause to your system. Some viruses or Trojans erase all your system back up and leave you in a hedge. Some are worse and locks up all your important resources like task manager, downloader, and registry and leaves you helpless.//__ <span style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 14px; font-style: inherit; font-weight: inherit; margin-bottom: 10px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">__//There are many things which you need to take care to __<span style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #e75f0d; font-family: inherit; font-size: 14px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">[|improve computer cyber security] __. You can get many products in the market assuring you to provide 100 percent safety against cyber hazards but nothing can do so. You have to be vigilant your self to protect your system and increase its degree of safety.//__ <span style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 14px; font-style: inherit; font-weight: inherit; margin-bottom: 10px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">__//****Upgrade your Operating System****//__ <span style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 14px; font-style: inherit; font-weight: inherit; margin-bottom: 10px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">__//It is one of the best ways to cope up with new virus definitions. Update your operating system from time to time as these are modeled to provide better security from new threats and security breaches.//__ <span style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 14px; font-style: inherit; font-weight: inherit; margin-bottom: 10px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">__//****Use Antivirus Software****//__ <span style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 14px; font-style: inherit; font-weight: inherit; margin-bottom: 10px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">__//Antivirus software protects your computer system against viruses, worms and Trojans. It checks any incoming file for infections and takes an appropriate action on tracing any infection in the file. Sometimes files needs to be deleted completely in order to safeguard other parts of the system. You can buy any antivirus software available in the market having good reputation.//__ <span style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 14px; font-style: inherit; font-weight: inherit; margin-bottom: 10px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">__//****Disable File Sharing****//__ <span style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 14px; font-style: inherit; font-weight: inherit; margin-bottom: 10px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">__//Most of the computers on the internet have their file sharing option on and this comes as a treat for hackers and intruders to send malicious codes to your computer system. One should check and change default settings of his system to __<span style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #e75f0d; font-family: inherit; font-size: 14px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">[|protect it from cyber threats] __. This option is present under “Network” in Control Panel. Select configuration panel and then uncheck file sharing box in TCP/IP tab.//__ <span style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 14px; font-style: inherit; font-weight: inherit; margin-bottom: 10px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">__//****Firewalls****//__ <span style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 14px; font-style: inherit; font-weight: inherit; margin-bottom: 10px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">__//As the name suggest, Firewalls are something to protect you from outside attacks and intrusion. It is one of the best options for cyber security. Install a firewall in your system to stop hackers to enter your machine. Most of the operating systems now come with built-in firewall options. You can enable or disable this as per you requirement.//__ <span style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 14px; font-style: inherit; font-weight: inherit; margin-bottom: 10px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">__//These are some of the ways with which you can improve computer cyber security and ensure a safe and secure data connectivity through out the globe.//__ <span style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 14px; font-style: inherit; font-weight: inherit; margin-bottom: 10px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">[] <span style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 14px; font-style: inherit; font-weight: inherit; margin-bottom: 10px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">This article in not of our own, it was found on the internet and we found it very useful. It talks about suggestion to improve the security system on computers. <span style="display: block; font-family: Helvetica,helvetica,sans-serif;"> <span style="display: block; font-family: Helvetica,helvetica,sans-serif;"> <span style="display: block; font-family: Helvetica,helvetica,sans-serif;"> Encrypted <span style="display: block; font-family: Helvetica,helvetica,sans-serif;"> Is the translation of data, into a secret code; that only the people who have the key could have acess to it. To read an ecrypted data or file you must have acess to the secret key or password that enables you to decrypt it. <span style="display: block; font-family: Helvetica,helvetica,sans-serif;"> Encyption is a method used to avoid the unwanted readers of a message. As an hypothetical example: <span style="display: block; font-family: Helvetica,helvetica,sans-serif;"> You send by mail (normal one) your credit card to a company in another country, you lock your credit card in a box which only you have the key; so that anyone (in the airplane, the transport or criminals) can open the box. When the box reaches the company, they cannot open it (because only you have the key), so then they send you an unlocked box with the key inside. You are asked to put your key in the box and close it with the key they sent you. So no one else will be able to open the box because you have the key. When you send it back, they will have another identical card to open the box they sent you. They will open the box and retrieve your key (to open your box, the one with your credit card). <span style="display: block; font-family: Helvetica,helvetica,sans-serif;">  <span style="display: block; font-family: Helvetica,helvetica,sans-serif;"> WarDriving:  <span style="display: block; font-family: Helvetica,helvetica,sans-serif;"> War Driving is the proces of driving you car around the block detecting wifi signalsmedia type="youtube" key="FQ3hqKEZgtI?fs=1" height="385" width="480"  <span style="display: block; font-family: Helvetica,helvetica,sans-serif;"> (Its also a misson on modern warfare 2)  <span style="display: block; font-family: Helvetica,helvetica,sans-serif;"> <span style="font-family: 'Helvetica','sans-serif'; line-height: normal; margin: 0cm 0cm 0pt;">There are certain Social and Ethical issues regarding the use of networks, such as:

<span style="font-family: 'Helvetica','sans-serif'; line-height: normal; margin: 0cm 0cm 0pt 36pt; text-indent: -18pt;">- Reliability and integrity: This refers to how thrust worthy is (in this case the network) and how well does it operate, this is based on terms of security and efficiency

- Security: This is how safe is your data (you) when using the network, as they might be certain hazards when in the network, such as hackers, viruses, etc.

- Privacy and anonymity: This controls the access to your information, and anonymity is meant to be as impersonal as it can

- Intellectual property: the intellectual property is basically the copy rights, which protect the work of the authors, from plagiarism

- Authenticity: This is a way in which your identity is stored, so that no one else may take it. (a good way to get this is to super passwords, or biometrics)

- The digital divide an equality of access: This is how accessible is the network (does it´s available in all places? do all people have access to the same information?)

- Surveillance: Is how well the supervision and intervention of the network is, regarding it´s “authorities” to maintain the order.

- Globalization and cultural diversity: Globalization is everywhere, so there might be diverse aspects related to the network about the way it involves different nations or countries

- Polices: This are the agreements that have to be made to access this network

- Standards and protocols: Is the range in which things need to be accomplished (to have a standard) while the protocols may be the ways in which these will work

- People and machines: The interaction between humans and machines, and how may this affect certain aspect of life

- Digital citizenship: Is your “ID” in the network, in which you are now part of, so you may be aware of certain social language or sections that may have a different meaning in this society (like in the case of internet, where typing things with your CAPS ON, may send the message that you are shouting)