Question: From the learner's perspective, one key advantage of having accessibility to many of the latest gadgets and gizmos is that it organically creates an ecosystem

From the learner's perspective, one key advantage of having accessibility to many of the latest gadgets and gizmos is that it organically creates an ecosystem to experience and practically study various technologies and principles.
Not too long ago, if you wanted to even remotely sense how some piece of technology or a security principle works in real life, you had to invest in expensive and complex equipment. Fortunately, that is not the case today. There is an excellent chance that, just in your home network right now, you have pieces of hardware and software invisibly operating and implementing many of the network and security principles you are learning in this module.
Furthermore, unfortunately, a common misconception among many home users regarding the security of their networks is that it is either too small to be at risk of a cyber attack or that the devices are made adequately secure by the manufacturer.
The reality is that most attacks are not personal and can happen on any network regardless of whether its home or business. Additionally, typically manufacturers optimize default configurations for functionality, ease of use, and performance, rather than security.
For this activity:
Take an inventory of the devices connected to your home network, such as computers, smartphones, smart TVs, baby monitors, and security cameras.
Then, investigate the network components that enable these devices to operate, intercommunicate, and access the internet. Examples of these include network cables, modems, routers, and Wi-Fi range extenders.
Finally, share the various security measures you have implemented, particularly on your home network components.
Review the links in the resource section and highlight practices you already had implemented. Why had you already implemented them?
Are there any configurations that you modified as a result of this activity? If not, why not? If yes, how was your experience making the change and the subsequent impact on the network's performance or functionality?
Share your thoughts on how home network security practice translates to an enterprise network? How can you use your home security experience to demonstrate your hands-on experience to future employers?
Resources
Basic Home Network Hardware Components, Devices, and Services Links to an external site. by Steve
How To Enhance Your Home Wireless Network Security Links to an external site. by Ioana Rihnetu

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!