1. By opening ports in your firewall it is allowing people access to your network and if anybody tries to get in figures out the port, they can potentially gain access to your system.
2. By going to start>control panel>firewall. Here it gives you the options that are on Windows Firewall.
3. E-commerce involves the passing of sensitive information like credit card numbers or bank account numbers over the internet, and the risk of losing the privacy of this information is high in public places. –Theft of unencrypted wireless data can easily occur in public areas because WiFi hotspots do not provide encryption such as WEP, WPA, or WPA2, in order to simplify the connection process and minimize the management workload. –Evil twin hotspots: these are hotspots setup by a hacker and made available to the public. Unknowing users who connect to the intent using these access points are then exposing their sensitive information to the hacker. To avoid being tricked by this set up, check to see if the login to a WiFi hotspot is SSl encrypted and look for a valid security certificate.
4. NIC, Acces Point, Wireless NIC
5. Video, conferencing, email, messaging, phone calls and Bluetooth.
6. WLAN such as wireless A, B, or G is commonly used for networking computers wirelessly and Bluetooth is a trademarked communications protocol initially designed for wireless keyboards and mice but now most commonly used for wireless cell phone headsets.
7. Having both NIC’s enabled on laptop or workstation that is hooked up to your network is if a hacker can gain access to your wireless NIC and your computer is also hardwired into your network that hacker can then easily gain access to your network via your workstation.
8. WEP's major weakness is its use of static encryption keys. When you set up a router with a WEP encryption key, that one key is used by every device on your network to encrypt every packet that's transmitted. But the fact that packets are encrypted doesn't