-
Essay / The History of Wi-Fi - 1985
Nowadays, with the vast amount of technology that surrounds us every day, it has become somewhat overwhelming for many individuals. There is a continuous back and forth game between ordinary people who respect the laws and ethics of civilization and clandestine hackers and scammers with the sole mission of making everything in an individual life a living nightmare. There are ways to reduce the risk of digital theft, harassment and financial repercussions, but with the speed at which various technologies are developing on a daily basis, it has become exponentially more difficult to achieve this due to the lack of time to learn to protect yourself. , unless of course it's the person working in the field in the first place. There are various vulnerabilities that an individual faces every day when it comes to their digital life. These vulnerabilities can become significant problems that could lead to a difficult recovery time, embarrassment, and even the possibility of facing criminal charges. Now what the hell could this happen to just one person who did nothing wrong? Let's start with the simple fact of unknown threats. Unknown threats to an individual are just that, unknown due to a lack of education, attention to detail, or simply not caring to deal with them. For example, one of the most basic vulnerabilities and exposures a person can have is simply allowing free access to their wireless broadband router purchased from a local tech store. It may not sound like such an offer, but an open wireless connection is essentially an open invitation for a spy to look into an individual's personal life. This has the potential to address all fallout scenarios... middle of paper ... revolutionary invention of 1965 changed our world. (nd). Retrieved from https://www.cs.ucsb.edu/~almeroth/classes/F04.176A/homework1_good_papers/Alaa-Gharbawi.htmlThe Invention of the Internet - Inventions - HISTORY.com. (nd). Retrieved from http://www.history.com/topics/inventions/invention-of-the-internetLock Down Your Wi-Fi Network: 8 Tips for Small Business | PCWorld. (nd). Retrieved from http://www.pcworld.com/article/244012/lock_down_your_wi_fi_network_8_tips_for_small_businesses.htmlThe societal costs of digital piracy. (nd). Retrieved from http://www.webroot.com/us/en/home/resources/tips/ethics-and-legal/the-societal-costs-of-digital-piracyUnderstanding the difference between wireless encryption protocols. (nd). Retrieved from http://blogs.cisco.com/smallbusiness/understanding-the-difference-between-wireless-encryption-protocols/