Skip to Content
Wireless and Mobile Device Security, 2nd Edition
book

Wireless and Mobile Device Security, 2nd Edition

by Jim Doherty
March 2021
Intermediate to advanced content levelIntermediate to advanced
400 pages
14h 24m
English
Jones & Bartlett Learning
Content preview from Wireless and Mobile Device Security, 2nd Edition

Targets of Opportunity versus Specific Targets

In general terms, there are two types of targets:

  • Targets of opportunity—A target of opportunity is a target that has not previously been identified or considered but that becomes available due to circumstances outside the hacker’s control. For example, if someone were to leave a smartphone or tablet at a coffee shop, that might constitute a target of opportunity for a hacker. Other targets of opportunity might include:
    • An unsecured Wi-Fi network in an executive’s home
    • An unsecured wiring closet
    • An unsecured rogue access point installed by an employee or an employee attaching to a nonverified free Wi-Fi in a public place to avoid a pay-per-use service

    A target of opportunity can even include cases ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Wireless and Mobile Device Security

Wireless and Mobile Device Security

Jim Doherty
Mobile Security and Privacy

Mobile Security and Privacy

Man Ho Au, Raymond Choo

Publisher Resources

ISBN: 9781284211733