Professional Documents
Culture Documents
DFP40263
SECURE MOBILE COMPUTING
TOPIC CHAPTER 4
ASSESMENT PRACTICAL EXERCISE 4
1) AHMAD YUSUF FARHAN BIN AWANG
NAME 2) MUHAMMAD HIDAYAT BIN AB AZIZ
3) MUHAMAD SYAFIQ IKRAM BIN MOHAMAD TARMIZI
1) 13DDT20F2008
REG NO
2) 13DDT20F2036
3) 13DDT20F2056
PROGRAMME DDT4 S1
INSTRUCTIONS:
1. Answer ALL the questions
2. Submit the assessment on
ASSESSMENT MEASURED:
CLO 1: Manipulate the aspect of mobile computing, model and security principles
using mobile computing technology to develop applications. (P3, PLO3)
QUESTION:
Wireless technology has become an essential part in mobile computing. The most
popular wireless technology nowadays is Wi-Fi. We can see Wi-Fi signals (SSID)
almost everywhere, it can be at home, shopping mall, airport, classroom even at the
parking lots. In a group of 3 persons, you are required to do some research about
Wi-Fi technology. Prepare a report about your findings base on the requirement
below.
Your group must produce a simple report using Microsoft Words and your report
must consist of these elements:
It can enabled devices like your TV, smartphone, tablet and computer.
Because they communicate with each other over airwaves, your devices and
personal information can become vulnerable to hackers, cyber-attacks and
other threats. This is especially true when you connect to a public Wi-Fi
network at places like a coffee shop or airport. When possible, it's best to
connect to a wireless network that is password-protected or a personal
hotspot. Your options for connecting wirelessly at home are growing as
mobile networks expand into the home internet realm. As with internet
service, there are advantages and disadvantages to each type of wireless
connection, such as speed and strength of signal. We've outlined a few of
them here.
Then, other security setting that we can easily set up is change the router's
default login and password to our own password and make sure it is not easy
password to remember to other people. If we leaving these unchanged is asking for
trouble, especially given how easy they are to change. The password and login must
be a little bit complicated or secretive to other people and only us can know the
detail of the password to avoid unwanted problem happen to our router Wi-Fi
connection such as stranger can access our Wi-Fi without our permission . To make
the password of Wi-Fi is complicated and not easily stranger can access is with when
create a password, we need to add some capital letter and number to avoid easy
phrase of password that can be guess. A strong Wi-Fi password can help prevent
unauthorized network access. In setting option ,a password, it's essential to choose
the correct WiFi security type. There are broadly two types , WEP and WPA. WEP
stands for Wired Equivalent Privacy. It is considered to be an old and outdated Wi-Fi
security type, having been replaced with WPA. If your router only supports WEP,
then it's time to get a new one. Check out our list of the best VPN routers to choose
a router that'll keep you safe. WPA stands for Wi-Fi Protection Access. WPA2 and 3
are the Wi-Fi encryption protocols you should be using. Most routers that are
available in the market support WPA-2, a secure and reliable protocol. WPA-3 is the
most up-to-date protocol and should be used if your router supports it.
Next easy step to setting security configure to Wi-Fi setting is we need always
change the router's SSID. The purpose of change SSID router number is refers to
the network's name that shows up when you're trying to connect to it. Very often, it
carries the name of the. Such SSIDs giveaway the router's brand, and possibly the
model, to any potential hacker, making her job much easier. Instead, you want to
use an SSID with no obvious correlation to its manufacturer. It's best to choose a
random name that has no linkage to your personal information. For instance, you
should
avoid SSIDs that carry your name or apartment number. The SSID, like other router
settings, can be changed by accessing the router's admin page.
c) 1) Net cut
Netcut or network Cut is an application that has a function to disconnect a
client from the internet by installing Netcut server. Use than one computer,
you can disconnect the other computers without needing to install on the
computer. In addition to disconnect the internet from the client, Netcut can
also take over the bandwidth of the computer client.
2)Wire shark
Wireshark is a data capturing program that "understands" the structure
( encapsulation) of different networking protocols. It can parse and display
the fields, along with their meanings as specified by different networking
protocols. Wireshark uses pcap to capture packets, so it can only capture
packets on the types of networks that pcap supports.
3)Net spot
NetSpot provides all professional wireless site survey features for Wi-Fi and
maps coverage of a living area, office space, buildings, etc. It provides visual
data to help analyze radio signal leaks, discover noise sources, map channel
use, optimize access point locations.
d) Source link / references
-https://www.verizon.com/articles/internet-essentials/wifi-definiton/
-https://vpnoverview.com/privacy/devices/configure-router-security-and-privacy/
-https://www.pcwdld.com/wifi-tools
TOOL
- NET CUT
NetCut is a simple and lightweight app that will scan your network for
connected computers, and it will help you retrieve the information about each
computer connected to it. It is designed to give you a clearer idea of what
computers you have hooked up to your network.
STEPS