Wireless Communications Infrastructure

Vulnerabilities in Wireless communications infrastructure

Threat analysis and countermeasures of the wireless communication

Threat vector scenarios in Wireless communications infrastructure.

Attack scenarios in Wireless communications infrastructure.

Vulnerability is a weakness which allows an attacker to reduce a system's information assurance.

released sensitive data

carry and install malware on any computing device configured to receive it.

Threat

include physical and software threats compromise the data on mobile devices.

Threat include everything from mobile forms of malware and spyware to potential for unauthorized access to a device's data.

Countermeasures

Encrypt all data transmitted through your access point.

Use firewalls on each network access point.

Install security updates as soon as they are available.

Install antivirus software on the wireless computer.

The threat vectors include the device itself, the applications on the device, compromised web sites, wireless data connections, other users and organizations, the organization to which the device user belongs, and the service providers

Social Media Protection

While email remains a significant attack vector, 70% of social media scams were manually shared.

All smartphones, as computers, are preferred targets of attacks.

These attacks exploit weakness inherent in smartphones that can come from the communication mode.


✏ SMS, MMS WIFI, Bluetooth and GSM