March 2021
Intermediate to advanced
400 pages
14h 24m
English
This chapter discussed the inherent vulnerabilities of wireless networking and how data thieves and hackers exploit these vulnerabilities. The very nature of radio-based communication makes this medium vulnerable. As such, it’s often the “way in” to networks when the goal is more than petty theft or eavesdropping.
It’s not just the vulnerabilities of wireless networks that put them at risk, however. The inherent vulnerabilities of the people who use them are also factors. These vulnerabilities include a lack of training and a lack of awareness, both of which hackers may take advantage of. After all, it’s easier to have someone give you a key than it is to pick a lock.
The good news is that many—perhaps even most—of these vulnerabilities ...