Rogue Access Points
A more significant concern for medium and larger networks is rogue access points. A rogue access point, or rogue AP, is an unauthorized AP attached to the wired network. These can be installed by hackers (with malicious intent) but can also be installed by well-meaning employees who simply want easier access to the network. In the latter case, hackers can easily exploit these rogue APs. In addition to being unauthorized, rogue APs are unmanaged, which makes them doubly vulnerable to attack. They may be added to the network to serve as an attack vector—a deliberately and maliciously installed device that provides an attacker with a convenient backdoor into the network. Just as AI and machine learning (ML) are being used to ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access