Local Area Network Advantages And Disadvantages | www2.bartleby.com
LAN (Local Area Network): A local area network is a group of computers which will share a common network communications line or wireless network to a server. A LAN encompasses computers and electronic devices which are connected to a server within a limited area such as an office or a building. Computers and other electronic devices use a LAN connection to share resources which are connected to LAN network like printer or servers.
MAN (Metropolitan Area Network): A MAN is a large computer network on the large geographical area that includes several buildings or even the entire city. The geographical area of MAN is smaller than WAN but larger than LAN. MAN includes several communicating devices and provides internet connectivity for the LANs
…show more content…
Wide area networks are commonly connected either through the internet. A WAN is different from MAN because of the distance between each of the networks. They can be private to connect parts of a business or they can be more public to connect smaller networks together.
Connecting to an unsecure wireless network can leave your computer or mobile device susceptible to a plethora of security risks and unwanted activity. Not only that, but unauthorized users can slow your connection down to a crawl, access your private data, or even use the network to perform shady activities that can be traced back to you. When accessing a wireless connection, you’re typically picking up an Internet connection sent wirelessly from a router or similar device. If unsecured, any computer within range can gain access to this network.
Enable Encryption: Encryption is one of your first lines of defense when it comes to securing a wireless network. It encodes the data sent wirelessly between your device and the router, essentially scrambling the information and restricting open
…show more content…
limiting your wireless signal include placing the router in certain areas of your house, away from windows, under a bed, or in a cupboard.
Keep the network up-to-date: Once you have a basic network audit and map complete, consider diving deeper. Check for firmware or software updates on all network infrastructure components. Login to the components to ensure default passwords have been changed, review the settings for any insecure configuration, and consider any other security features or functionality you currently aren’t using. (Eric G – 2014)
Use VPNs to encrypt select PCs or servers: Although you can encrypt all the traffic, first analyze your network. It might make more sense to just encrypt select communications you deem the most sensitive that isn’t already encrypted, such as through SSL/HTTPS. You can pass the sensitive traffic through a standard VPN on the client, which could be used just during the sensitive communication or forced to be used all the time. (Eric G –