O'Reilly logo

CWSP® Certified Wireless Security Professional Official: Study Guide by Shawn M. Jackman, Bryan E. Harkins, David A. Westcott, David D. Coleman

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 8. Wireless Security Risks

IN THIS CHAPTER, YOU WILL LEARN ABOUT THE FOLLOWING:

  • Unauthorized rogue access

    • Rogue devices

    • Rogue risks

    • Rogue prevention

  • Eavesdropping

    • Casual eavesdropping

    • Malicious eavesdropping

    • Eavesdropping risks

    • Eavesdropping prevention

  • Authentication attacks

  • Denial of Service (DoS) attacks

    • Layer 1 DoS

    • Layer 2 DoS

  • MAC spoofing

  • Wireless hijacking

  • Encryption cracking

  • Peer-to-Peer attacks

  • Management interface exploits

  • Vendor proprietary attacks

  • Social engineering

  • Physical damage and theft

  • Public use and WLAN hotspots

Wireless Security Risks

Unauthorized Rogue Access

The corporate WLAN is an authorized wireless portal to network resources. In Chapter 4, "Enterprise 802.11 ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required