Please enable JavaScript.
Coggle requires JavaScript to display documents.
Vulnerabilities and Threats of Wireless Communication. (WIRELESS…
Vulnerabilities and Threats of Wireless Communication.
WIRELESS COMMUNICATION INFRASTRUCTURE THREATS VECTORS
AND ATTACK SCENARIOS
Particular threats of the wireless communication are :
i. device theft
ii. malicious hacker
iii. malicious code
iv. and theft of service
Three groups of threats can be characterized:
the application-based threats
the content-based threats
and the mixed threats.
Application-Based Threats
Application-based threats are roughly posed by executable malicious codes that are inserted into
existing or new wireless applications.
These threats are equivalent to the earliest type of
computer viruses that attacked executable programs.
Content-Based Threats
In content-based threats, the content is the threat (e.g., derogatory messages) or the malicious use of
the content is the threat (e.g., spamming of email).
Networks have been known to crash under the
weight of spam attacks.
While email is one of the key features of the wireless world, email is also one among the most vulnerable to attacks.
Mixed Application Threats
The third type of threat offers a greater potential for damage than the previous two types of known
threats.
an attack could involve the unwitting download of a sophisticated malicious code attached to a shareware program that deletes wireless device applications and propagates itself rapidly across the wireless infrastructure via address books of email.
.
WIRELESS COMMUNICATION INFRASTRUCTURE VULNERABILITIES.
WLAN Vulnerabilities
The easy installation and use of an AP
.
This vulnerability allows any individual to introduce an unauthorized wireless network in unauthorized areas. The easy installation and configuration of the AP make this feasible for legitimate or illegitimate users.
The AP configuration
If the AP is poorly configured or unauthorized, then it can provide an open door to attackers. This is caused by using a default configuration that annihilates the security controls and encryption mechanisms that the AP is able to provide in normal use.
Physical security of an authorized AP.
Because most APs are deployed by default, their placement and ease of access are critical. An AP has to be correctly placed and physically protected in order to avoid accidental damage
(made, for example, by a direct access to the physical cable attaching the AP).
Signal range of an authorized AP.
This vulnerability is characterized by the possibility that the AP signal strength extends beyond a given perimeter (the perimeter of a building, for example).. Consequently, the AP’s placement
and the signal strength have to be closely studied to make sure that the transmitting coverage of the AP
Rogue AP.
This vulnerability allows an attacker to place an unauthorized (or rogue) AP on the network area and configure it to look legitimate to the network users to gain access to a wireless user’s sensitive data.
Protocol weaknesses and capacity limits on authorized APs.
These vulnerabilities can cause Denial of Service attacks (DoS) from malicious users utilizing unauthorized APs when they can flood authorized AP with traffic forcing them to reboot or deny accesses.
WIRELESS COMMUNICATION INFRASTRUCTURE VULNERABILITIES.
Cellular System Vulnerabilities:
Radio link protection-only vulnerability.
Because wireless messages travel through the air, between the handset and the access node, for transmission to the receiver, messages may need to be changed to another protocol..
Service interruption vulnerabilities.
The increased capacity offered by the high-speed communication technologies has resulted in the reduction of cable routes necessary to meet traffic capacity requirements.
Handset vulnerabilities.
Unlike computer systems, handsets are limited regarding the security features.The implementation of security mechanisms can present some weaknesses allowing attackers to launch successful attacks.