Dillon's Computer Security Essay

Dillon Kupferschmid Contact Info: E-Mail: dk526a@lab.icc.edu

Log In


Linux Successes

1. The Ford Motor Company is using Linux for the sake of making their customer's convenience their top priority. According to the article, Ford seems to be able to utilize new features, fixes, and updates to make their technology run in an optimal state, allowing for their company to pick up the slack for certain business ventures. They are investing a decent stock in this technology, as they believe it is the way to go which will allow them to not only make things for themselves convenient, but it is also a huge factor in making sure that their company is still in the green, as they can use things like the cloud to help back up sensitive information so that is never lost. Needless to say, with Ford using Linux, they have become a much more productive company all things considered.

2. UPS, a major package delivery service now benefited by the power of Linux. Using Linux, UPS has been able to have a much more optimal method of tracking package deliveries and such. With such technology, package delivery is at an all time high at the moment, making the overall ability of delivery services even more efficient, especially due to COVID-19's interference with public services. Once again, as with Ford, UPS's productivity has increased tenfold due to the ability of Linux's efficient methods of data storage and input. Using Linux Red Hat allows them to adopt a much more agile method of information processing compared to some other companies without Linux, making their work efficient.

3. Microsoft, perhaps one of the biggest names in technology, but how do they fare with Linux? Microsoft has been using Linux technology to simplify consumer demands, as well as their own manufacturing processes. They have been utilizing a new network approach once again, and with Linux in their grasp, productivity is much more efficient. Using the Red Hat Systems, they have reduced the requirement to follow routine, as well as general complexity.

Wireless Network Statistics

802.11a:

- Raw data processed at 54 Mbps at a 5 GHz frequency band.

802.11b

- Runs at a speed of 11 Mbps with a range of 150 feet, and runs on a 2.4 GHz frequency band. (These are the basic standards of an 802.11b connection)

802.11g

- Runs at 54 Mbps, which is much faster than the previous, but the frequency band is still the same, at only 2.4 GHz.

802.11n

- Speed is at 300 Mbps, but it can reach up to 450 Mbps if using three antennae, and the frequency band can toggle between either 2.4 GHz like previously, or it can reach up to 5 GHz.

802.11ac

- Speed is 1.1 Gbit/s, and the frequency band rate is at 2.4 GHz to 5 GHz like previously.

What is Wardriving?

- Wardriving is the process of searching for Wi-Fi networks from some device that is portable, like if you were looking for a signal.

How to Secure a Wi-Fi Network

1. One way to secure your Internet and Wi-Fi is by using a standard WPA2 encryption network, as most general devices support it.

2. Another way to change your Wi-Fi network to be secure is by adding a new password to your Wi-Fi frequently, so that nobody can infringe on your personal Wi-Fi data and/or hotspots.

3. You should change the deafult SSID name to something more personal or unique, because if you leave the generic name, you essentially just give away your information to others so they can get on to your Wi-Fi network.

4. Other things you can do are turn off guest sharing and turn off your router when you aren't using it. Basically, there are multiple sort of "self-refraining" ways to prevent your Wi-Fi being used without your discretion, such as not giving out your password and hiding your router in a secure area in your home, but the biggest thing is just to be selective with who can use it. There are plenty of programs that exist for the sake of being able to alter your router's source to keep your Wi-Fi masked, like a VPN program or something of that nature, but once again, it focuses more on self restraint.

So in conclusion, it is more about adding in some level of encryption to make sure your Wi-Fi doesn't get jacked, but overall, it just takes a lot of checking, password securing, and encrypting to make sure that you don't lose your security when it comes to your personal Wi-Fi.




To Access Dillon Kupferschmid's Index Page

Valid CSS!

Valid CSS Blu!


Build Date: April 12, 2021,11:45 AM