Securing a Wireless Network
Understand how a user's wireless network work. This is by finding wirelesss router/access point and from there changing the necessary configurations to update the security of the network.
Recommendations chosen to implement wireless security controls is:
Setting up a guest network
Install a firewall
Apply a VPN
Adding a guest network ensures no one can access your own private network when it is necessary to share. Firewall controls who come in and out the network and VPN ensures privacy.
How do these implementations improve the security of the wireless network?
implement wireless security controls is setting up a guest network and applying a VPN.
Implementing security controls reduces the risk of being hacked and having your information leaked or compromised. In order to protect a data, it is necessary to take precaution steps. Just like going to an ATM, no one displays their pin in public but rather try their best to hide it. The same concept applies to a computer. Your computer is like the bank, full of information that can be stolen if not properly hidden. There are many ways to protect from hackers. One of the ones I recommend is setting up a guest network. When fewer people have less access to your network, it is less likely to get compromise. Just like a physical house, if you have guest come over, you won’t have them access your work office room, but will rather have them stay at the guest room. Another way to implement a security control is installing a firewall. Having a firewall is having another form of defense. It is like putting a lock in your office room that way when guest come over, you know for sure that your office room will not be access and opened because it is already locked. And the third recommendation is applying a VPN. When using a public network, without VPN is like walking around a public area with a Identification card hanging out as a lanyard. With a VPN is simply hiding your identification in plain sight. There are many other ways to protect your wireless network security but applying the three recommendations is easily manageable for any users not familiar with technology. Implementing these security controls is user friendly and fast.