You are on page 1of 3

1. Create a Local Network using your own Hot Spot.

Each hot spot should have 5 connected devices,


including the hot spot providing device. In this setting you should create a group with 5 members. In this
hot spot submit the screen shot that shows the identity of the connected device (Name of the
device/Owner). (25 points)

LEGEND:
Realme 7 – Benidic Espinosa
Weird – Alex Kaindoy
Unknown – Charles Fonzy Varquez
Infinix – HOT – 11 – Play – Reynard Narciso
Realme C3 – Melvin Siega

2. Perform file sharing in this hot spot and discuss how the file sharing was done by any sharing application
(Ex. Share It and other sharing application). (25 point)

Application Used: Nearby Share


3. Discuss any possible file protection in this hot spot scenario. Explore any possibilities of unwanted file
access in this Hot spot connection. Identify any vulnerabilities

Hot spots, those wireless networks that provide internet access in public areas like coffee shops or
airports, can be convenient but also risky due to weak security measures. To protect your files in a hot
spot scenario, consider these measures:

 Encryption: Use tools like BitLocker or FileVault to encrypt files on your device, or use secure file
transfer protocols like SFTP when transferring files over the hot spot connection. Encryption
scrambles data to make it unreadable to unauthorized users.
 Passwords: Set strong, unique passwords for your devices and file-sharing accounts. Avoid easily
guessable passwords and enable multi-factor authentication for an extra layer of security.
 Firewall: Use a firewall to block unauthorized access to your device. A firewall filters network traffic
and can help prevent potential attacks or unauthorized file access.
 Disable file sharing: Turn off file sharing or set it to "private" mode when connected to a hot spot.
This prevents others from accessing your files through network sharing features on your device.
 Virtual Private Network (VPN): Use a VPN to encrypt your internet connection and route your traffic
through a secure server. This protects your files from potential eavesdropping or interception on the
hot spot network.

Potential vulnerabilities or risks associated with using a hot spot for file access may include:

 Unsecured Wi-Fi: Hot spots may not have proper encryption or authentication measures, making it
easier for hackers or unauthorized users to intercept or access files transmitted over the network.
 Man-in-the-middle attacks: Hackers may use techniques like "man-in-the-middle" attacks to
intercept data being transmitted between your device and the hot spot network, potentially gaining
access to your files.
 Malware or viruses: Hot spots can be breeding grounds for malware or viruses, which can infect
your device and potentially gain access to your files.
 Rogue hot spots: Hackers may set up fake hot spots with the same name as a legitimate hot spot to
trick users into connecting to their network, giving them unauthorized access to files and other
data.
 Unauthorized access: Other users connected to the same hot spot may be able to access your files if
proper file sharing settings are not configured on your device.

You might also like