Computer Security – Coursework Example

How to secure hotspot surfing al Affiliation How to hotspot secure surfing Today, there are many opportunities to connect to public WI-FI hotspots everywhere, but the networks are open and insecure. This has posed a threat to hacker accessing you private information. There are several consideration undertaken to ensure safe internet browsing. One should have security browser extensions especially HTTPS Everywhere from Electronic Frontier Foundation (EFF). Research studies have dictated that the user should have a secure connection as one-visit common sites of interest with other people. It has also allowed one to create own XML configure file to add more sites, which has been key in enhancing security to hotspot surfing (Briere & Hurley, 2011).
To enable security on hotspots, one should enable the firewall. Today, most of the operating systems come with at least a basic firewall. It is the simplest and most convenient way of keeping unwanted people from accessing or from poking at your computer. The program also allows for editing whereby you can decide on the applications allowed to be accessed by others. It is always advisable turn the application on for security purposes.
Additionally, one should ensure that you use Secured Sockets Layer for sensitive sites (SSL). As you use this WI-FI, you should always ensure that any web site you log on to that deals with sensitive information like information about your bank account, always use e- mail or FTP, these are protected with SSL encryption. It ensures that information passing to and from your laptop and the site or service are secure, even if you are you are on a real or fake hotspot (Adelstein & Hiser, 2004).
On the other hand, one may disable sharing to ensure security when using WI- FI. Some hotspots do not block the communication between connected users. It is advisable to always disable file sharing while surfing at such public locations to avoid hackers from accessing your information. Many cases of people hacking other peoples’ accounts especially on the public network has been on rampant increasing and I believe that if these mechanisms are employed, these predicaments will be faced out.


References
Adelstein, T., & Hiser, S. (2004). Exploring the JDS Linux desktop: [Linux for prime time with Java desktop system. Beijing [u.a.: OReilly.
Briere, D. D., & Hurley, P. J. (2011). Wireless home networking for dummies. Hoboken, NJ: Wiley
Briere, D. D., & Hurley, P. J. (2005). Wireless network hacks & mods for dummies. Hoboken, N.J: Wiley Pub.