1) The biggest problem with using wireless networks is ________.
a) accessibility
b) cost
c) security
d) usability
2) ________ is an unauthorized access point into a wireless network.
a) A rogue access point
b) An evil twin attack
c) Eavesdropping
d) War driving
3) ________ refers to efforts by unauthorized users to access data that are traveling over wireless networks.
a) A rogue access point
b) An evil twin attack
c) Eavesdropping
d) War driving
1. Answer: c. security
The main concern of using wireless networks is security. Wireless networks, particularly public Wi-Fi hotspots are much more vulnerable than wired ones for of several major reasons. To begin, the wireless networks typically rely on fewer powerful encryption standards or even no encryption in some cases which enables easy interception of data by hackers. Next, wireless signals are sent in all directions and this can present an opportunity to potential hackers within reach of the network who may be able capture data from it. Wired networks have contained signals. Third, identification of the users on public wireless networks is a challenging task and hackers can easily access the network without bagging their identity. Fourthly, hackers can place rogue wireless access points which the users may not know and once connected allow data capture. On wired networks, this cannot be done. Finally, there are also newer wireless standards such as WPA2 that have potential vulnerabilities which should be patched in a timely manner. It is essential to maintain the wireless networks updated . Overall, unauthorized access to wireless networks is much easier than wired ones because of their openness and anonymity. Therefore, the main disadvantage of wireless networks continues to be security.
2. Answer: b. An evil twin attack
A rogue access point is an unauthorized wireless hotspot that connects to a wired network without authorization. Rogue access points can be installed by hackers in public places to hijack a nearby private wired network, enabling them to steal data and intrude on the network. They transmit signals that devices can use to join them, believing they are legitimate networks with internet access. However, the rogue access point works as an unsecured backdoor to key network. Sometimes employees thoughtlessly install personal rogue access points, and they connect them to the office network; thus bypassing security controls . Network monitoring and wireless intrusion prevention systems can identify rogue access points before major destruction is caused. On the whole, rogue access points are unsafe unauthorized tunnels to protected wireless networks.
3. Answer: c. Eavesdropping
In eavesdropping, hackers intercept data packets that wirelessly transmit and access information without consent from the sender or receiver. However, since wireless waves propagate in all directions it is relatively simple to intercept network traffic with receiving antennas or packet sniffers within the range. When something is encrypted, eavesdropping becomes more challenging but not impossible. However, professional hackers can crack poorly standardized encryption to decode encrypted network packets. One of the main reasons for their popularity is that public Wi-Fi networks have no access restrictions and are therefore easy to eavesdrop on. Public network users should understand that nearby hackers may eavesdrop on their data. The private or enterprise wireless networks are also threatened if the encryption protocols have either become outdated and obsolete or prey vulnerable . In general, eavesdropping is one of the major security threats to wireless networks.
Leave a Reply