What are two of the unique challenges posed by wireless networks?

What will be an ideal response?


Unauthorized users might access the network-Because a wireless signal is not confined to the four walls of the building, an unauthorized user can often pick up the signal outside the building's security perimeter. It is possible for an intruder to be lurking in the parking lot with a wireless laptop computer to intercept the signals and access the network.

Attackers can eavesdrop on transmissions-In a wired network, an attacker would have
to gain access to the interior of the building to reach the network cabling infrastructure
before he could access the network to eavesdrop on data being transmitted. With a
wireless network, if that information is not properly protected an attacker only has to
pick up the wireless signal in order to see what is being transmitted.

Employees can easily compromise network security - An employee could purchase
inexpensive wireless equipment and then secretly bring it into the office in order to
provide personal wireless access. However, this could defeat the existing network
security because it allows an attacker to pick up the employee's illicit wireless signal
and enter the network by bypassing the organization's security.

Attackers can easily crack legacy wireless security - Early types of wireless networks
had basic security features that were easy for attackers to defeat. Although current
products have more robust security features, legacy products with these weak security
features are still in use. Users are then sometimes mistaken in their belief that, because
the security features are turned on, they are protected.

Computer Science & Information Technology

You might also like to view...

Which condition guarantees that a doubly linked list with head and tail nodes is empty?

a. head==NULL b. tail==NULL c. head==tail d. head->next==tail->prev e. none of the above

Computer Science & Information Technology

Explain the meaning of the following computer programming statement:

x = x + 1 a. This statement is invalid b. This statement says that x and x + 1 are equal c. This statement says increment the value of x d. Any of the above may be correct depending on the specific programming language. e. None of the above.

Computer Science & Information Technology

You can group selectors so they share the same style declarations by separating each selector with a(n) ____.

A. semi-colon B. comma C. colon D. period

Computer Science & Information Technology

User support expense budgets are often divided into two large categories: personnel and facilities.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology