According to experts in the security industry, to shutdown a network or server is not a security measure because it does not allow users to access resources on a server. Non-availability of a network violates the confidentiality, integrity, and availability triad. On the other side, a server facing the internet – in spite of a DMZ or three firewalls – is still susceptible to malware because of frameworks like Metasploit which allows developers to customize payloads to evade firewalls and anti-virus software.
Since the emergence of internet, we have heard of how hackers deployed Melissa virus, worms and trojans to steal user’s information, cause computers to behave abnormally, and cause anti-virus to stop working effectively. Moreover we have heard of how attackers took advantage of default settings to access and modify users’ permissions. Incompetence is the culprit.
Fortunately for us, security researchers have come up with diverse patches and security measures to cover up vulnerabilities. WPA2 with AES is preferred to other wireless security protocols like WEP and WPA with TKIP (Temporal Key Integrity Protocol). It is a network security technology commonly used on Wi-Fi wireless networks. However, upgrading WPA with AES is also not a