Wireless Communications Infrastructure
Vulnerabilities in Wireless communications infrastructure
Threat analysis and countermeasures of the wireless communication
Threat vector scenarios in Wireless communications infrastructure.
Attack scenarios in Wireless communications infrastructure.
Vulnerability is a weakness which allows an attacker to reduce a system's information assurance.
released sensitive data
carry and install malware on any computing device configured to receive it.
Threat
include physical and software threats compromise the data on mobile devices.
Threat include everything from mobile forms of malware and spyware to potential for unauthorized access to a device's data.
Countermeasures
Encrypt all data transmitted through your access point.
Use firewalls on each network access point.
Install security updates as soon as they are available.
Install antivirus software on the wireless computer.
The threat vectors include the device itself, the applications on the device, compromised web sites, wireless data connections, other users and organizations, the organization to which the device user belongs, and the service providers
Social Media Protection
While email remains a significant attack vector, 70% of social media scams were manually shared.
All smartphones, as computers, are preferred targets of attacks.
These attacks exploit weakness inherent in smartphones that can come from the communication mode.
✏ SMS, MMS WIFI, Bluetooth and GSM