preview

What Are Strategies Used For The Home And Professional Network?

Good Essays

This response excludes any known professional network direct information due to signed confidential employee/contract workplace agreement and therefore is inappropriate to discuss in this forum. However, I will outline strategies employed for both home and professional networks in general terms. All of these techniques and strategies are deployed or considered depending on risk. First, consider a home network Service Set Identifier (SSID) technique and strategy. One simple, robust idea for home networks I use is to disable the network name SSID from being broadcast at all. Mitchell in 2017 found, one of the benefits “using this technique will increase the chances that would-be intruders will bypass your network and look for easier targets …show more content…

Remote usage - disable access from others. Implemented on both home and professional networks to prevent “cybercriminals won’t be able access to your router’s private settings from a device not connected to your wireless network” (Cucu, 2016) This technique and strategy is simple to implement. Next, upgrading software. Maintain network device software upgrades. This includes antivirus and malware patches and or upgrades as needed. This is a daily routine that the software is preprogrammed to do. One often overlooked piece of software is a browser. A browser is an attackers’ favorite access point. Zaharia, in 2016, found browsers with this message “cyber criminals use browsers as their main way into your PC” (Zaharia, 2016) She added another threat, “malicious browser add-ons” (p.1) Her source was “the researchers behind Cisco’s Annual Security Report” (p.1) In summary do not to run old version browsers and remove add ons. In addition, this article were other network solution tools. Some included, using a Virtual Private Network, a proxy server, turn your firewall on, install antivirus and antimalware software, encrypt your data. These options should be considered by network owners either for home or a professional network and are the backbone in many environments today. Next, monitoring traffic over a network. One way to manage who or what visits a network is to monitor traffic. Hackers use sophisticated

Get Access