Tech Topic Connection: The Internet and The Web
The history of computers goes back to 1937, but most think of the start of computers when the internet began in 1962 when the Advanced Research Projects Agency Network (ARPANET) was created by the Department of Defense in the United States. In fact, the first computer was a calculator called the Pascaline, built-in 1642! Computers operate in what is known as the Internet of Things, like calculators, smart watches, and electric cars.
So why would your smartphone be called an Internet of Things and not just a phone?
Well, cars are now built to receive your phone information and Wi-Fi hotspot through apps like myChevrolet and T-Mobile's SyncUp Drive- Car Wi-Fi Hotspot & Tracking App. Bluetooth capability and quiet kids are a significant plus on an extended car ride. That is, until you notice someone following you and taking every exit and turn you make.
Imagine your car using your phone's navigational map like Google Maps, and you can manipulate your phone using the car's dashboard. Your phone would be considered the Internet and the apps you can use with the car's functions. Now, the Web would be the Wi-Fi other devices can connect to and those nearby if passwords are not created. Bluetooth, NFC, or Wi-Fi activated on devices would constitute the network. The network is how you can access the internet and the web. The car, of course, is the computer.
Bluetooth, NFC, and Wi-Fi each have their own levels of security.
For instance, there is a company that can capture your driver ID (car) with a Bluetooth fob and can capture everything about your car's location! You would need to lower your firewall so the key fob can access private information first or enter a code to pair the devices. This type of "secured" network is not always dependable. You know, without a doubt, you activated this fob and connected it to your car on your private home network. But what about the packets being sent to ping back and forth to cell towers?
To make this example understood, have you ever tried to connect your phone to what you thought was your new Bluetooth speaker, and it connected to some neighbor's TV? Did you return to your Bluetooth settings and tell your phone to forget the device, or just disconnect and attach it to the correct device? Well, that is what a computer's primary function is to do. Send and receive information, and sometimes store information until it is turned on again, restarting database management processes.
So, what is NFC? NFC is a wireless technology that allows information to be shared between nearby devices. Remember the creepy driver following you?! Computers have permissions that can be set to accept all documents or require you to approve each interaction. What happens when that small crying child says, "I keep trying to download it, but it won't work!" You think you are safe with the Google Family Link and are irritated, messaging and driving, and just click yes on your phone to quiet the kid. Everyone wins, including the random follower who unblocked the kid's phone and waved hello. Your phone has saved the password to the car Wi-Fi, and you just shared your phone's information. NFC is like clicking a link in an email and turning your life upside down.
What is Wi-Fi? We all know we must turn this on to access the internet and web using a data network. It is what makes the Internet and Web free! Especially when you haven't taken the time to download the free McAfee Security App for T-Mobile on your Android and Apple devices.
The Role and Database of App Software
App software was created to simplify life when you are always on the go. Database management functions make it easier to locate what is needed when collaborating with others and share updates with ease, like when telecommuting for work. App software can be considered the Web, and database management as the Internet. Each has set protocols (or lack of restrictions) in place for them to function according to the build. Bluetooth, NFC, and Wi-Fi are all parts of the network architecture, like doorways. The devices they connect to should manage all inputs and outputs within security protocols. Unfortunately, due to human error, breached security protocols can change the database management system of software applications roles.
How to Protect Your Bizness
- Make sure your Bluetooth is only being used when you absolutely need it.
- NFC should always be turned on briefly when you are actually sharing information and remain turned off at all times.
- Wi-Fi should be used at home, and your devices should be set to download only on Wi-Fi.
- Make sure to have your devices always ask for permission before downloading.
- Keep your devices updated by letting them update overnight while sleeping on your secured Wi-Fi network.
- And always read the fine print! Permissions will tell you what they want and how to revoke access.
Comments
Post a Comment