Chapter 8. Wireless Security Risks

IN THIS CHAPTER, YOU WILL LEARN ABOUT THE FOLLOWING:

  • Unauthorized rogue access

    • Rogue devices

    • Rogue risks

    • Rogue prevention

  • Eavesdropping

    • Casual eavesdropping

    • Malicious eavesdropping

    • Eavesdropping risks

    • Eavesdropping prevention

  • Authentication attacks

  • Denial of Service (DoS) attacks

    • Layer 1 DoS

    • Layer 2 DoS

  • MAC spoofing

  • Wireless hijacking

  • Encryption cracking

  • Peer-to-Peer attacks

  • Management interface exploits

  • Vendor proprietary attacks

  • Social engineering

  • Physical damage and theft

  • Public use and WLAN hotspots

Wireless Security Risks

Unauthorized Rogue Access

The corporate WLAN is an authorized wireless portal to network resources. In Chapter 4, "Enterprise 802.11 ...

Get CWSP® Certified Wireless Security Professional Official: Study Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.