answersLogoWhite

0


Best Answer

In order to avoid others accessing your files and keeping your information secure you need to make sure that your system and router are password protected. This way others are not able to access your information.

User Avatar

Wiki User

11y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What type of security should I use for this access point to avoid other people accessing my files?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

what's the difference between network security and web security?

network security would protect internal resources from internal attacks or problems. It focuses on networks, firewalls, routers, VLAN's, IDS, access control, et cetera. Web Security would block attacks from the web as well as making sure computers are not accessing things on the web they should not be accessing (eg porn, viruses, etc).It focuses on web servers, daemons and services, their operating system, SQL, safe scripting, et cetera.


Does a password ensure total laptop security?

A password can protect from intruders accessing your computer physically, however, for total laptop security, you should consider protecting against key-loggers and viruses.


What should you do if someone forgets their access badge physical access?

What should you do if someone forgets their access badge (physical access)? a. Loan them your access badgeb. Open the door for themc. Give them your access coded. Alert the security office


What should you do if someone forgets their access badge (physical access)?

What should you do if someone forgets their access badge (physical access)? a. Loan them your access badgeb. Open the door for themc. Give them your access coded. Alert the security office


Why do iPad have passcode?

To prevent you from accessing the personal data that is on there, to protect the owner's privacy. They also make it harder for thieves to access should the iPad be stolen.


What is a common mistake people make when accessing health care?

not knowing when healthcare should be accessed


Which access control model should you use to grant access to resources in order to ensure the highest level of security?

MAC


In accordance with the Wireless Security Standards SSID broadcast option should be turned off at the access point?

True; Make sure that the ESSID/SSID broadcast option is turned off at the access point!


Should the essid or ssid broadcast option should be turned off at the access point Wireless Security standards bbp?

True


Can someone access my personal files or see me chatting from another computer if they use our internet access--My computer says a wireless computer is trying to access the internet through my hookup?

If someone has access to the data stream from your computer to any servers you connect to, then yes (in the example of wireless connections). Although it's unlikely they can control your computer, it can see what information you are sending or receiving. You can prevent someone accessing your computer by using a simple firewall, and to prevent someone accessing the data stream, you should use an encryption key. The instructions of how to do so should be on the software manufacturer's website. (microsoft = microsoft.com) Use SSL connections when available to ensure security. And never place personal information over a non-secure connection. The way to identify a secure connection is simple, most web browsers have a logo meaning security is enabled. It is usually a closed padlock. These icons will be found either on the address bar or on the status bar.


Which section of a security policy is used to specify that only authorized individuals should have access to enterprise data?

The access control section of a security policy is typically used to specify that only authorized individuals should have access to enterprise data. This section outlines the mechanisms and rules for granting and revoking access rights to data, ensuring that sensitive information is only accessed by approved personnel.


What are advantages and disadvantages of linked storage?

Advantage everyone on the network should have access. The disadvantage is that if the network storage is not security protected anyone could gain access