Chapter 8. Wireless Security Risks
IN THIS CHAPTER, YOU WILL LEARN ABOUT THE FOLLOWING:
Unauthorized rogue access
Rogue devices
Rogue risks
Rogue prevention
Eavesdropping
Casual eavesdropping
Malicious eavesdropping
Eavesdropping risks
Eavesdropping prevention
Authentication attacks
Denial of Service (DoS) attacks
Layer 1 DoS
Layer 2 DoS
MAC spoofing
Wireless hijacking
Encryption cracking
Peer-to-Peer attacks
Management interface exploits
Vendor proprietary attacks
Social engineering
Physical damage and theft
Public use and WLAN hotspots
Unauthorized Rogue Access
The corporate WLAN is an authorized wireless portal to network resources. In Chapter 4, "Enterprise 802.11 ...
Get CWSP® Certified Wireless Security Professional Official: Study Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.