Open WiFi - This refers to a Wi-Fi network that does not require a password to join. A user can create an open Wi-Fi network in the Wi-Fi settings on their router, allowing anyone within range to connect., Tethering - This involves using one device (often a smartphone) to share its internet connection with other devices., Data Interception - On an open network, an attacker can easily intercept the data that you send and receive, including sensitive information like credit card numbers and passwords., Malware Distribution - Attackers can also use open networks as a platform for distributing malware, infecting connected devices., Unauthorised Access - With no security barriers, attackers can gain access to your device through the network, manipulating data and settings., Blackspots  - An area where network service is unavailable., Availability - Cloud servers are always online so if you have a stable Internet connection, you will be able to connect to one and manage your own files., Scalability - Cloud service providers like Google and Microsoft ordinarily give you a certain amount of “free space”, so if you do happen to run out of space you can always buy more., Synchronisation - t if you were to make changes on one device and immediately check another, you would see your files up-to-date, provided both were connected to the Internet., Layout - a user interface’s " "needs to be simple and intuitive to use., Accessibility - Ensuring that the cloud service is usable to those with individual needs, such as a visual impairment, is often a key consideration for a business., Disaster Recovery - is a plan that a business puts in place to limit the damage caused when a disaster occurs., Maintenance - Looking after software and keeping it up to date, Compatibility - is about whether the cloud service you use can work with the hardware, software and data that you are currently using.,

Leaderboard

Visual style

Options

Switch template

Continue editing: ?