ALL >> Computers >> View Article
Threats Introduced By Wireless Networks
The following threats are present wherever wireless networks exist:
Attacks can be of any type that Windows XP Professional could be launched from a wired connection, including password-cracking attacks, attempts to find weak controls, broadcast monitoring(whereby an attacker sniffs data as it traverses your network), or even the launching of a worm, virus, or Trojan horse attack. While use of a switch instead of a hub as a connection point for the wireless AP might prevent casual listening to all traffic on the network, Address Resolution Protocol (ARP) spoofing can be used to trick the switch into routing data through the intruder's client.
Even if the intruder means no harm and is just seeking free access to the Internet, if his computer is infected with a worm or virus, he might spread it to your network.
This type of attack might be accomplished by an attacker against wireless networks that rely on SSL VPNs for access security. In this attack, the intruder uses an ARP spoofing technique and attempts to substitute his server credentials. The client gets a warning ...
... that the credentials have changed and is asked to accept them. If a user accepts the credentials, the communications destined for the client's internal network are now redirected to the attacker's rogue server.
Unauthorized connections by anyone with a computing device and a wireless network card to an unsecured wireless access point Access to the wireless network does not require a wired connection MCP certification.A connection to your wireless network might be made just as easily from the parking lot of your building, the
sidewalk outside its front door, or the offices on the floor above as it is from your business offices. While a wireless connection does not remove the protections you have in place using authentication, access controls, and encryption, a wireless connection does allow unauthorized individuals access to your network, inside your firewall. Any connection to your inside network is a potential threat.
Attacks on your wireless clients from other wireless clients Joining your wireless client to an unsecured wired network places you on a network with
unknown participants. This is like being connected to the Internet without a firewall. Any attack that might be mounted over the Internet can also be used against clients on a wireless network.
Attacks from rogue access points that have created unauthorized access points to the network Employees might connect a wireless access point to
their authorized network connection. They do this to make it easier to move around the general area of their office without a wire or to allow visitors to their area to connect to the network. An intruder might seek to connect a rogue wireless access point to an unattended network jack. If the intruder is successful, he now has a connection to your network from outside your facilities.
An attacker might attempt to capture logon credentials by placing a fake access point near the legitimate one. If her access point has a stronger signal, she can entice clients to attempt to log on to her wireless network instead of the real one. When clients attempt to log on, she might be able to capture logon credentials that can be used in an attack on the client's MCSE study guides free download real networks.
Add Comment
Computers Articles
1. Few Good Insights To Follow With Pc Gaming In Australia!Author: Jack Williams
2. Transform Your Online Store With Australia's Leading Ecommerce Developers
Author: themerchantbuddy
3. How To Choose The Right Technology For Your mobile App?
Author: goodcoders
4. The Rise Of User Centered Web Design
Author: goodcoders
5. Reasons Why Laravel Perfect For Web Development?
Author: goodcoders
6. Ssd Vs Sas Vs Sata Drives: Which Is Better For Your Dedicated Server Hardware?
Author: The CyberTech
7. Raid Servers And Data Protection: Common Myths About Raid Servers
Author: The CyberTech
8. Top 8 Do's And Don’ts When Dealing With A Corrupted Sd Card
Author: The CyberTech
9. Nvme Vs Ssd: What To Choose For Your Storage Solutions?
Author: The CyberTech
10. 8 Common Data Recovery Myths Exposed!
Author: The CyberTech
11. Understanding Ssd Lifespan: Signs, Durability, Data Recovery, And Factors Affecting The Life Of An Ssd
Author: The CyberTech
12. Server Data Recovery Solutions: When Your Raid Server Is Crashed!
Author: The CyberTech
13. Data Recovery Solutions For Undetected Ssd On Bios
Author: The CyberTech
14. Problems Faced By Mobile Phone Users: Green Line Issue, Motherboard Failure, Phone Stuck On Logo And Mobile Data Recovery Possibilities
Author: The CyberTech
15. Ssd Vs Hdd: Weaknesses, Data Recovery Factors And Failure Rates
Author: The CyberTech