Please enable JavaScript.
Coggle requires JavaScript to display documents.
Wireless Communications Infrastructure (Vulnerabilities in Wireless…
Wireless Communications Infrastructure
Vulnerabilities in Wireless communications infrastructure
wireless networks often pass sensitive information in the clear that can do harm to individuals and/or organizations.
released sensitive data - the cause of legal action
carry and install malware on any computing device configured to receive it.
this malware can cause data corruption, data leakage, and the unavailability of services and functionality.
personal privacy can also be affected if the audio for example
Bluetooth
and
device camera
are intercepted and used with malicious intent.
Threat analysis and countermeasures of the wireless communication
Threat include everything from mobile forms of malware and spyware to potential for unauthorized access to a device's data, particular in the case of accidental loss or theft of the device.
Threat
is a path or a tool that a threat actor uses to attact the target.
Encrypt all data transmitted through your access point.
Set the access point to accept only Media Access Control (MAC) addresses.
Use firewalls on each network access point.
Avoid storing sensitive data on wireless machines whenever possible. Encrypt sensitive data that must be stored on the machine.
COUNTERMEASURES
Threat vector scenarios in Wireless communications infrastructure
The actors (threat vector) include the device itself, the applications on the device, compromised web sites, wireless data connections, other users and organizations, the organization to which the device user belongs, and the service providers
Insider Threat
Privileged users, such as managers with access to sensitive information, pose the biggest insider threat to organtizations. This is followed by contractors, consultants, and regular employees. Compromised account credentials, or when someone's account is hijacked, are also a big part of this risk.
Attack scenarios in Wireless communications infrastructure
Attack
- All smartphones, as computers, are preffered targets of attacks.
These attacks exploit weaknesses inherent in smartphones that can come from the communication mode -- SMS, MMS, WIFI, Bluetooth and GSM.
ultimate target is usually a network rather than the device itself.