Skip to Content
Wireless and Mobile Device Security, 2nd Edition
book

Wireless and Mobile Device Security, 2nd Edition

by Jim Doherty
March 2021
Intermediate to advanced content levelIntermediate to advanced
400 pages
14h 24m
English
Jones & Bartlett Learning
Content preview from Wireless and Mobile Device Security, 2nd Edition

CHAPTER SUMMARY

This chapter discussed the inherent vulnerabilities of wireless networking and how data thieves and hackers exploit these vulnerabilities. The very nature of radio-based communication makes this medium vulnerable. As such, it’s often the “way in” to networks when the goal is more than petty theft or eavesdropping.

It’s not just the vulnerabilities of wireless networks that put them at risk, however. The inherent vulnerabilities of the people who use them are also factors. These vulnerabilities include a lack of training and a lack of awareness, both of which hackers may take advantage of. After all, it’s easier to have someone give you a key than it is to pick a lock.

The good news is that many—perhaps even most—of these vulnerabilities ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Wireless and Mobile Device Security

Wireless and Mobile Device Security

Jim Doherty
Mobile Security and Privacy

Mobile Security and Privacy

Man Ho Au, Raymond Choo

Publisher Resources

ISBN: 9781284211733