Please enable JavaScript.
Coggle requires JavaScript to display documents.
WIRELESS COMMUNICATION INFRASTRUCTURE VULNERABILITIES (WLAN…
WIRELESS COMMUNICATION INFRASTRUCTURE VULNERABILITIES
Most of the existing vulnerabilities in the wireless networks are caused by the medium.
Because transmissions are broadcast, they are easily available to anyone who can listen to them.
WLAN Vulnerabilities
The easy installation and use of an AP.
This vulnerability allows any individual to introduce an unauthorized wireless network in unauthorized areas. The easy installation and configuration of the AP make this feasible for legitimate or illegitimate users.
The AP configuration.
If the AP is poorly configured or unauthorized, then it can provide an open door to attackers. This is caused by using a default configuration that annihilates the security controls and encryption mechanisms that the AP is able to provide in normal use.
Physical security of an authorized AP.
most APs are deployed by default, their placement and ease of access are critical
. An AP has to be correctly placed and physically protected in order to avoid accidental damage (made, for example, by a direct access to the physical cable attaching the AP).
Signal range of an authorized AP.
This vulnerability is characterized by the possibility that the AP signal strength extends beyond a given perimeter (the perimeter of a building, for example).
Rogue AP
This vulnerability allows an attacker to place an unauthorized (or rogue) AP on the network area and configure it to look legitimate to the network users to gain access to a wireless user’s sensitive data.
Protocol weaknesses and capacity limits on authorized APs.
These vulnerabilities can cause Denial of Service attacks (DoS) from malicious users utilizing unauthorized APs when they can flood authorized AP with traffic forcing them to reboot or deny accesses.
Cellular System Vulnerabilities
Service interruption vulnerabilities:
The increased capacity offered by the high-speed communication technologies has resulted in the reduction of cable routes necessary to meet traffic capacity requirements
Handset vulnerabilities:
Unlike computer systems, handsets are limited regarding the security features. The implementation of security mechanisms can present some weaknesses allowing attackers to launch successful attacks.
Radio link protection-only vulnerability:
e wireless messages travel through the air, between the handset and the access node, for transmission to the receiver, messages may need to be changed to another protocol.
Such change can be done at a gateway, for example, to allow a wireless transport layer security (WTLS) message to be changed to a secure socket layer (SSL) message.