Download presentation
Presentation is loading. Please wait.
1
CompTIA Security+ Study Guide (SY0-501)
Chapter 5: Wireless Network Threats
2
Chapter 5: Wireless Network Threats
Compare and contrast types of attacks
3
Wireless Vulnerabilities
Wireless systems are vulnerable to all the different attacks that wired networks are vulnerable to. All radio frequency signals can be easily intercepted.
4
Wireless Vulnerabilities
Replay Rogue access points Any wireless access point added to your network that has not been authorized is considered a rogue. Evil twin attack This is one in which a rogue wireless access point poses as a legitimate wireless service provider to intercept information users transmit.
5
Wireless Vulnerabilities Continued
Jamming WPS Bluejacking The sending of unsolicited messages (think spam) over the Bluetooth connection Bluesnarfing The gaining of unauthorized access through a Bluetooth connection
6
Wireless Vulnerabilities Continued
NFC and RFID Disassociation The intruder sends a frame to the AP with a spoofed address to make it look like it came from the victim and disconnects them from the network.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.