February 2016
Beginner
274 pages
6h 6m
English
Prevention, detection, and investigation of illegal network activity is greatly strengthened by an intimate knowledge of the different modes of unauthorized access. The security perimeter of a Wi-Fi network is quite porous and breaches can come from multiple vectors.
To help enhance this knowledge, let's discuss the common attacks on Wi-Fi networks.
When a user turns on his laptop and his device accidentally associates itself with an available Wi-Fi network (maybe due to the network being open), this is known as an incidental connection. The user may be unaware that this has occurred. This can be classified as an attack since the laptop may also be connected to another wired network ...
Read now
Unlock full access