ITGS Portfolio :: Are Wi-Fi networks safe? My interview with an IT expert.

Authors Avatar

Name-Ishaan Khanna

Criterion N: Discussion and Analysis of the Interview

Wi-Fi technology is being used in most of the new devices. Devices such as, smart phones, video game consoles, laptops, iPods, etc use it. Many people in day to day life are using this technology. This technology is being used in hotels, airports, restaurants, offices, homes, schools etc. Wi-Fi is a technology, which is replacing local area networks where wire is used for the connection to the Internet.

There are drawbacks of this technology, which include, others can connect to your network and get all the personal information of the user. The network many a times is left unsecured due to which anyone can access the Wi-Fi unable device.

Mr. Paraskar has been working in the crime branch for the last five years. He has received many complains regarding this technology and is working in order to improve the same. According to Mr. Paraskar hacking into Wi-Fi network is a serious issue and it can create too many problems. Innocent citizens would be blamed if their I.P. addresses are hacked. The highly confidential data can be leaked and misused by the others. It is of paramount importance that the Wi-Fi owners to set a password and change it regularly from time to time to reduce the chances of it being subject to hacking, and whenever there is a problem it should be reported to the cyber crime branch as soon as possible to reduce or prevent any form of damage. There are even other various ways or protecting the network.

Join now!

The Mac address of the laptop should be entered to the Wi-Fi box and only those particular devices familiar to the system may be able access the Wi-Fi network, with the help of the security password. This is one more way of keeping the network secure. It is very important if the network is secured so that no one misuses it.

In the past, there were several threats in the form of emails sent from a Wi-Fi network which was unsecured and the felon was unable to be traced down. We try and keep the networks secured so that ...

This is a preview of the whole essay