Disciplines
- MLA
- APA
- Master's
- Undergraduate
- High School
- PhD
- Harvard
- Biology
- Art
- Drama
- Movies
- Theatre
- Painting
- Music
- Architecture
- Dance
- Design
- History
- American History
- Asian History
- Literature
- Antique Literature
- American Literature
- Asian Literature
- Classic English Literature
- World Literature
- Creative Writing
- English
- Linguistics
- Law
- Criminal Justice
- Legal Issues
- Ethics
- Philosophy
- Religion
- Theology
- Anthropology
- Archaeology
- Economics
- Tourism
- Political Science
- World Affairs
- Psychology
- Sociology
- African-American Studies
- East European Studies
- Latin-American Studies
- Native-American Studies
- West European Studies
- Family and Consumer Science
- Social Issues
- Women and Gender Studies
- Social Work
- Natural Sciences
- Anatomy
- Zoology
- Ecology
- Chemistry
- Pharmacology
- Earth science
- Geography
- Geology
- Astronomy
- Physics
- Agriculture
- Agricultural Studies
- Computer Science
- Internet
- IT Management
- Web Design
- Mathematics
- Business
- Accounting
- Finance
- Investments
- Logistics
- Trade
- Management
- Marketing
- Engineering and Technology
- Engineering
- Technology
- Aeronautics
- Aviation
- Medicine and Health
- Alternative Medicine
- Healthcare
- Nursing
- Nutrition
- Communications and Media
- Advertising
- Communication Strategies
- Journalism
- Public Relations
- Education
- Educational Theories
- Pedagogy
- Teacher's Career
- Statistics
- Chicago/Turabian
- Nature
- Company Analysis
- Sport
- Paintings
- E-commerce
- Holocaust
- Education Theories
- Fashion
- Shakespeare
- Canadian Studies
- Science
- Food Safety
- Relation of Global Warming and Extreme Weather Condition
Paper Types
- Movie Review
- Essay
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- GCSE Coursework
- Grant Proposal
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- Essay
- GCSE Coursework
- Grant Proposal
- Interview
- Lab Report
- Literature Review
- Marketing Plan
- Math Problem
- Movie Analysis
- Movie Review
- Multiple Choice Quiz
- Online Quiz
- Outline
- Personal Statement
- Poem
- Power Point Presentation
- Power Point Presentation With Speaker Notes
- Questionnaire
- Quiz
- Reaction Paper
- Research Paper
- Research Proposal
- Resume
- Speech
- Statistics problem
- SWOT analysis
- Term Paper
- Thesis Paper
- Accounting
- Advertising
- Aeronautics
- African-American Studies
- Agricultural Studies
- Agriculture
- Alternative Medicine
- American History
- American Literature
- Anatomy
- Anthropology
- Antique Literature
- APA
- Archaeology
- Architecture
- Art
- Asian History
- Asian Literature
- Astronomy
- Aviation
- Biology
- Business
- Canadian Studies
- Chemistry
- Chicago/Turabian
- Classic English Literature
- Communication Strategies
- Communications and Media
- Company Analysis
- Computer Science
- Creative Writing
- Criminal Justice
- Dance
- Design
- Drama
- E-commerce
- Earth science
- East European Studies
- Ecology
- Economics
- Education
- Education Theories
- Educational Theories
- Engineering
- Engineering and Technology
- English
- Ethics
- Family and Consumer Science
- Fashion
- Finance
- Food Safety
- Geography
- Geology
- Harvard
- Healthcare
- High School
- History
- Holocaust
- Internet
- Investments
- IT Management
- Journalism
- Latin-American Studies
- Law
- Legal Issues
- Linguistics
- Literature
- Logistics
- Management
- Marketing
- Master's
- Mathematics
- Medicine and Health
- MLA
- Movies
- Music
- Native-American Studies
- Natural Sciences
- Nature
- Nursing
- Nutrition
- Painting
- Paintings
- Pedagogy
- Pharmacology
- PhD
- Philosophy
- Physics
- Political Science
- Psychology
- Public Relations
- Relation of Global Warming and Extreme Weather Condition
- Religion
- Science
- Shakespeare
- Social Issues
- Social Work
- Sociology
- Sport
- Statistics
- Teacher's Career
- Technology
- Theatre
- Theology
- Tourism
- Trade
- Undergraduate
- Web Design
- West European Studies
- Women and Gender Studies
- World Affairs
- World Literature
- Zoology
Home Wireless Network Securely, Speech Example
Hire a Writer for Custom Speech
Use 10% Off Discount: "custom10" in 1 Click 👇
You are free to use it as an inspiration or a source for your own work.
Part 1
Rationale
This is to present the class with the importance of putting up a home network and how it could be secured effectively. This presentation shall also try to expand on how securing a home network could be done based on particular research on specific references both online and offline.
Target Audience
The class would be a specific target audience for this presentation since everyone is expected to be interested in putting up home internet networks for the sake of completing school works as well as engaging in recreational social networks.
Importance of the Topic
The establishment of a home-defined wireless network has become one of the most common if not the most important requirements in regular homes. Due to the intensified use of the internet, even homes have become hot spots for areas where worldwide web connections are expected to exist. Having an internet service that connects one particular home to the worldwide web then is considered to be a great advantage for many individuals who can actually afford the said service. Relatively though, the accumulation of such service also involves the home to specific dangers and negative situations. One of which is the issue of network security.
Given that the setup is wifi, it means that the network’s connection could be accessed by other users [at times even by those outside of the house, given that they are within the approximate range of distance from the router]. This is the reason why it is very important to learn about the most common and essential ways to establish a secure wireless network setup.
Part 2:
Introduction
To introduce the topic, I would present the class with the statistics regarding homes having their own home network connections and the percentage that is currently at risk for malicious users and malwares that may attack the whole private files of a home-computer due to the invasion of online viruses.
Supporting Data and Reference:
Source: Federation American Scientsts. http://www.irational.org/APD/cyber/netstats.htm. (Retrieved on September 8, 2013).
The diagram shows that a considerable number of households in America depend on home networks for their internet connectivity options; in the aim of improving the competence of such connections, the need to secure the networks becomes a necessity among most subscribers noted in the diagram.
Conclusion
True, the internet has become a common need, even for families, to have in their own homes. Relatively, the growth of worldwide involvement with the use of internet made it necessary for homes to establish their own connections with ISP programs. Paying for such type of service for the sake of establishing a home’s capacity to establish a more efficient manner of communication and simply being connected online is a requirement that almost every household is expected to take into consideration. Nevertheless, if any family decides to establish their own home internet network, they should also be able to measure the balance on how they are to protect themselves from possible malicious users online. Viruses that could directly come from the internet could endanger the private files of the family which then should be given attention to, hence, it is important that in the process of establishing a home network, such issue should be handled effectively. The availability of software programs that are designed to help novice users of the home networks to establish protection for their setups is now getting specific attention from those who decide to establish such home-based connection. Taking advantage of such provisions would then allow both novice and expert computer users to enjoy the internet and get the best benefits from it as much as they could without the fear of being exposed to malicious users or malwares that could actually be found online. All these protective measures are dedicated to keeping the privacy of homes intact while also giving them the chance to access the world’s most expansive source of information. Yes, the benefit of the internet is strong enough to build a society, however, without the consideration on how the conditions of security is established to protect a family’s privacy while being connected online, such benefits of the internet could be fully jeopardized.
References
Faure, Jean-Philippe. “IEEE P1901 Draft Standard for Broadband over Power Line Networks: Medium Access Control and Physical Layer Specifications,” IEEE Standards Association, http://grouper.ieee.org/groups/1901/. (Retrieved on September 5, 2013).
Greg Holden, Lawrence C. Miller. (2011). Home Networking Do-It-Yourself for Dummies. John Wiley and Sons.
Wangerien, Brian. “The Challenges of Wi-Fi.” Communications News. Encyclopædia Britannica. Web http://www.britannica.com/bps/additionalcontent/18/21597846/The-challenges-of-WiFi. (Retrieved on September 5, 2013).
Part 3:
Three Potential Questions
- Why do we need to have an internet network at home? What are the benefits of it?
- What specific dangers could an internet home network face?
- How could we make sure that the network set at home is properly secured?
Possible Response
Procedures to Consider:
- First to note on the process of assuring the network’s security is the choice of equipment to be used for the setup. The modem to be used as the main source of the wifi internet connection should be strong enough as well as complete with setup management tools that could enable the user to specifically direct the network’s accessibility for specially authorized users. The wireless router should also be specifically compatible with the modem which would enable the user to manage the operation of the network at a much easier and effective manner.
- The next factor to consider is the positioning of the router. The router is the primary source of the internet signal which is supposed to be distributed within a controlled distance. In a home, it is most effective to place the router at a central location. This will enable users of the internet from specific areas of the house to access the worldwide web easier where the connection would actually function at its best.
- Third matter to give attention to is the series of securing operations that should be taken into account to make sure the network could be accessed only by authorized users inside the home. One process to take note is the regular changing of default user name and password. This will make it harder for outside intruders to access the network and utilize the internet. Another process to give consideration is the setting up of network key which would serve as the setups protection. This option of protecting the network is close to dealing with file cabinets with keys and safe-combinations. This way, only authorized individuals or users would actually be able to access the network and use the internet connection it serves. This option is also considered as one of the most user-friendly operations that allow novice users to setup their own protective keys to make sure of the network’s safety.
Other Options of Network Protection
To further strengthen the protection of the network, it is highly recommended that a network firewall be established. This is completed through the aid of a software program that shall specifically stand as guard to the network against malicious users. Through this manner, the network could avoid malicious access from hackers as well as be protected from viruses that could be accessed online. There are instances when those surfing or browsing the internet accidently ump against online viruses which puts the entire network including all the other users connected to it in relative danger.
Finalization
Overall, the idea of protecting a home internet network is supportive of the idea of establishing a more secure home. Usually, when the term ‘home’ is being talked about, privacy comes into mind. Hence, in an agreeable equation of logic, it is just right to consider that it is highly important for home internet networks to be private and specifically accessible only to authorized users. Passwords and encryptions are specifically among the most important elements used by programmers and computer experts to find a way to protect local home networks from malicious users.
Stuck with your Speech?
Get in touch with one of our experts for instant help!
Tags:
Time is precious
don’t waste it!
writing help!
Plagiarism-free
guarantee
Privacy
guarantee
Secure
checkout
Money back
guarantee