Discuss wireless network security threats, including the following: LAN jacking (war driving), spoofing, and rogue WLANs.
What will be an ideal response?
Wireless networks require the same security tools, such as encryption and passwords, and for the same reasons, such as privacy and risk of exposure to malicious code, as wired networks. Wireless networks are vulnerable to more threats than traditional wired networks. One of these threats is LAN jacking, or war driving, which is the act of driving around with a laptop, antenna, and wireless card, looking for unsecured wireless networks to access. LAN jacking not only exposes a network to viruses and other risks, but can tie up a network's bandwidth and impact its performance. Spoofing is when a hacker accesses a network to setup a fake website or send mail that looks like it is coming from and internal server. In addition, a hacker can create a rogue WLAN by installing a wireless router that uses network resources and exposes the network to security threats.
You might also like to view...
A 3-D reference is a pointer to a cell in another worksheet
Indicate whether the statement is true or false
When designing icons, select commonly recognizable imagesthat the audience will understand.
Answer the following statement true (T) or false (F)
The indirection operator in C is ____.
A. . B. -> C. & D. *
The ____ contains the local declarations and the function statements.
A. function body B. function header C. function declaration D. function description E. function code