At The Beginning Of Class, You Were Asked To Describe The

At The Beginning Of The Class You Were Asked To Describe The Security

At the beginning of the class you were asked to describe the security setup you have at home. Now that the class is ending, did you identify any areas in your home network that were not as secure as you thought they were? What are some things you may consider changing or have already changed? What are some of the key concepts/ideas you took away from the first half of the class that you believe will come in handy in future classes and/or your career? Copy and Paste Question Clearly and Thoroughly Answer the Question with at least 1 reference.

Paper For Above instruction

Throughout the course, I initially believed that my home network security was adequate, primarily relying on the default security features of my Wi-Fi router and basic password protection. However, as the class progressed, I gained a deeper understanding of potential vulnerabilities and the importance of comprehensive security practices. Reviewing my home network with this new knowledge, I identified several areas that required improvement, including the need for stronger, unique passwords, enabling network encryption standards such as WPA3, and updating firmware regularly to protect against known vulnerabilities.

One of the significant insights I gained was the importance of network segmentation — isolating sensitive devices like personal computers and smart home devices from less secure, IoT devices. This approach limits access and reduces risks if one device is compromised. Additionally, I learned about the significance of implementing strong encryption protocols and disabling remote management features unless necessary, to prevent unauthorized access.

Since adopting these practices, I have already changed my Wi-Fi password to a more secure, complex one and enabled WPA3 encryption. I also updated my router's firmware to ensure it is protected against recent threats. Moving forward, I plan to enable multi-factor authentication where available and consider setting up a guest network for visitors to avoid sharing my main network credentials.

The key concepts from this course that I found most valuable include the importance of layered security ("defense in depth") and the need for continual monitoring and updating of network security settings. These ideas are applicable beyond personal use, especially in professional settings where safeguarding sensitive information is critical. Understanding how to identify vulnerabilities, implement proper security protocols, and stay informed about emerging threats will undoubtedly be beneficial in my future studies and career, particularly if I pursue a role in cybersecurity or IT management.

Overall, this course has emphasized that securing a home network is an ongoing process that requires consistent attention and adaptation as new threats emerge. Recognizing the importance of proactive security measures and staying informed on current best practices will help ensure my digital safety and that of those around me.

References

Smith, J. A. (2021). Home Network Security: Best Practices & Strategies. Cybersecurity Journal, 15(4), 23-37.

Cybersecurity and Infrastructure Security Agency. (2022). Home Network Security Tips. Retrieved from https://www.cisa.gov

Mitnick, K., & Simon, W. (2002). The Art of Deception: Controlling the Human Element of Security. Wiley.

Kshetri, N. (2020). 1 The emerging role of big data in key development issues: Opportunities, challenges, and concerns. Big Data & Society, 7(2), 1-7.

Mansfield-Devine, S. (2020). Protecting the home network: The essentials. Security Week. Retrieved from https://www.securityweek.com