Skip to Content
Wireless and Mobile Device Security, 2nd Edition
book

Wireless and Mobile Device Security, 2nd Edition

by Jim Doherty
March 2021
Intermediate to advanced content levelIntermediate to advanced
400 pages
14h 24m
English
Jones & Bartlett Learning
Content preview from Wireless and Mobile Device Security, 2nd Edition

Scouting for a Targeted Attack

When planning a cyberattack, attackers will spend a great deal of time profiling the network and organization, probing for clues to the systems and devices deployed on the network. Typically, attackers look for any weak spots or backdoors that will enable them to gain access. The first step in the execution of any attack is to gain a foothold.

decorative NOTE

Even in cases when power settings have not been changed, the reach of RF signals can vary greatly, depending on external factors. These include seemingly trivial factors such as rearranged furniture, plant and tree trimming, or changes in season.

When assessing an organization’s ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Wireless and Mobile Device Security

Wireless and Mobile Device Security

Jim Doherty
Mobile Security and Privacy

Mobile Security and Privacy

Man Ho Au, Raymond Choo

Publisher Resources

ISBN: 9781284211733