List common security threats for wireless LANs. Find a specific case in which the security of wireless LANs was threatened. Given the case you find, comment on how to prevent or mitigate the threats?

What will be an ideal response?


1) Eavesdropping: The attacker passively monitors wireless networks for data, including authentication credentials.
2) Man-in-the-Middle: The attacker actively intercepts communications between wireless clients and access points to obtain authentication credentials and data.
3) Masquerading: The attacker impersonates an authorized user and gains certain unauthorized privileges to the wireless network.
4) Message Modification: The attacker alters a legitimate message sent via wireless networks by deleting, adding to, changing, or reordering it.
5) Message Replay: The attacker passively monitors transmissions via wireless networks and retransmits messages, acting as if the attacker was a legitimate user.
6) Misappropriation: The attacker steals or makes unauthorized use of a service.
7) Traffic Analysis: The attacker passively monitors transmissions via wireless networks to identify communication patterns and participants.
8) Rogue Access Points: The attacker sets up an unsecured wireless network near the enterprise with an identical name and intercepts any messages sent by unsuspecting users that log onto it.
Students' answers vary on the specific case and the approaches to mitigate the threats.

Business

You might also like to view...

A reply is a document filed by the original plaintiff in response to the defendant's cross-complaint

Indicate whether the statement is true or false

Business

A meta-analysis found that using contingent rewards improves

a. individual performance b. team performance c. organizational performance d. all of the above

Business

Which of the following limitations does not apply to the government in civil proceedings to take a person's liberty or property?

a. Procedural Due Process. b. The Takings Clause. c. Substantive Due Process. d. The Equal Protection Clause.

Business

Based on the research described in this chapter, which of the following is not central to the development of expertise?

a. depending on natural talent b. mindful, deliberate practice c. feedback d. breaking large goals into small and specific techniques

Business