CHAPTER SUMMARY
This chapter discussed the inherent vulnerabilities of wireless networking and how data thieves and hackers exploit these vulnerabilities. The very nature of radio-based communication makes this medium vulnerable. As such, it’s often the “way in” to networks when the goal is more than petty theft or eavesdropping.
It’s not just the vulnerabilities of wireless networks that put them at risk, however. The inherent vulnerabilities of the people who use them are also factors. These vulnerabilities include a lack of training and a lack of awareness, both of which hackers may exploit. After all, it’s easier to have someone give you a key than it is to pick a lock.
The good news is that many—perhaps even most—of these vulnerabilities ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access