Very little of what we do on our computing devices is done in a standalone manner. We use emails, communicate and interact using social media, search for information and access application services provided over the internet. All of these activities are only possible if we are online, connected to the internet, while using our applications.
So, how do we connect to the internet? The internet is a collection of interconnected networks. To connect to a network there needs to be an interconnection that allows us to go from our local area network (LAN) environment and join use to the wider area network (WAN) environment.
There are three primary ways that modern devices connect to the internet:
Our devices have all got networking capabilities. Each device supports one or more of the following connections:
Wi-Fi and Ethernet are local area network connections. Cellular data connections are wireless WAN connections. All three of these connections can be used for internet access.
Bluetooth is for connections that are personal, used typically for connecting personal devices or sharing data between users of mobile devices. Bluetooth is not typically used when connecting to the internet.
Using public Wi-Fi networks is an affordable way of getting to our internet services. Are we exposing ourselves to risks when doing this? How can we protect our information when mobile and connected?
When connecting to a ‘hotspot’, we can see if the network is secure or not. A Wi-Fi network may open or secured. Secure may simply mean that all users will need to provide an authenticator (password or key) to gain access. The fact that the network requires a password does not mean your data is encrypted when transferred. It is possible for someone to sit in the Wi-Fi area and ‘snoop’, observing your traffic and gathering potential useful information from you.
Generally, public networks are not secure. If you wish to access services that cause sensitive information to be transferred (username and password, bank account information or transactions), it is safer to use your own private cellular connection.
Also note that we are able to configure our devices to share information and resources, and even allow remote access and control. If these setting are enabled, and we connect to public networks, we open ourselves up to the risk of someone else gaining access to our information over the network connection.
If your device allows connections over Bluetooth, others can attempt to gain access to your device and data. Bluetooth is commonly used between friends to share music, photos and other information with each other. If you leave your Bluetooth active, you are at risk.