security and maintenance
securitycomputer2.jpg

Image:Top security tips [http://www.top-security-tips.com/images/securitycomputer2.jpg]

To secure a wireless network there should be a password so that nobody else is able to connect to the network, no authorization can cause problems. For instance such as hackers getting into the system this can be stopped .

Also encryption should also be used as this system can secure the data being transmitted and also being stored. It can make data transmitting in and out the network private.

Wired Equivalent Privacy (WEP) "a security protocol for……(WLANs)…… WEP is designed to provide the same level of security as that of a wired LAN. LANs … more secure than WLANs because LANs are somewhat protected by the physicalities of their structure, …….protected from unauthorized access."

Reference: webopedia [http://www.webopedia.com/TERM/W/WEP.html]

WiFi Protected Access (WPA) "security standard adopted by the WiFi…. ensures interoperability …….WPA (TKIP) is a great solution, providing much stronger security than WEP, ….allowing compatibility and upgrades with older equipment."

Reference: openxtra , [http://www.openxtra.co.uk/articles/wpa-vs-wep.php]

Firewalls "A system designed to prevent unauthorized access to or from a private network. …. implemented in both hardware and software….. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks,"

Reference: webopedia [http://www.webopedia.com/TERM/F/firewall.html]

a good way of authorizing private networks . " inspects incoming data and blocks requests for inappropriate access or actions"

Reference:( How networks work, Les Freed, Que publishing, 2005, p203)

A home network should also be maintained and software should be updated regularly so that data can operate with new software. In addition an anti virus software can help manage data traveling in and out the network.

Furthermore networks can be maintained by:

* managing network connections

* Backing up the network

* Repair and testing network connections

Unless otherwise stated, the content of this page is licensed under Creative Commons Attribution-ShareAlike 3.0 License