Lab1 Networking
Lab1 Networking
Security App
• Know about the network security issues in different types of network devices.
• Identify a mobile security app and how it works for mobile security.
1.1 Introduction
As long as you have all the hardware, you can quickly set up any wireless network. Here is
everything you need to know about the hardware you need to have in place before you use
Windows to configure the wireless network. There are two types of wireless networks:
infrastructure and ad hoc. The infrastructure network is most likely the type of wireless
setup you have in your home or office. It’s laid out similarly to a wired network, but without
wires.
• Wireless Routers:
Wireless routers function similarly to traditional routers for wired Ethernet networks.
They are typically deployed when building an all-wireless network from scratch.
Access points, which allow wireless networks to join an existing wired network, are
often used to expand existing networks.
• Wireless Antennas:
Access points and routers use antennas to improve the communication range of
wireless signals. Optional, removable, or aftermarket antennas can also enhance
the range of wireless adapters.
• Wireless Repeaters:
Also known as signal boosters or range expanders, these devices connect to a
router or access point and extend the range of wireless signals, helping devices
connect to the network from farther distances.
• Wire-based Connections:
Most wireless routers include Ethernet ports for connecting to broadband modems
and wired devices. This feature allows for a hybrid setup of wired and wireless
components.
• Flexibility and Portability: Easy to relocate and set up, especially useful for
apartments or frequent moves.
• Terminology:
o WLAN (Wireless Local Area Network): Another term for wireless networks.
o AP (Access Point): Refers to the hub connecting wireless devices, not the
Associated Press.
Mobile app security refers to the protection of mobile applications against malware and
unauthorized access. With mobile devices being composed of numerous components,
vulnerabilities can arise from architectural flaws, device theft, platform weaknesses,
permission issues, and application-specific weaknesses.
CM Security (Clean Master) is a free app developed by Cheetah Mobile, offering various
features to protect devices from threats.
Features of CM Security: