Wireless Network Vulnerabilities
On a computer system, data has three states: data at rest, data in use, and data in transit. Data in transit or transmitted data are especially vulnerable when the transit medium is wireless radio frequency (RF) transmissions, like that used on a wireless local area network (LAN). This vulnerability is difficult to mitigate due to the fact that wireless network traffic is virtually impossible to confine, unlike transmissions over a wire or cable media. In situations where wireless networking services are openly available without requiring some form or authentication or authorization, the wireless signal is in the air and open to anyone within range and is inherently not secure.
However, it is not only public ...
Get Internet and Web Application Security, 3rd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.