Please enable JavaScript.
Coggle requires JavaScript to display documents.
Wireless Communications Infrastructure (Vulnerabilities in Wireless…
Wireless Communications Infrastructure
Vulnerabilities in Wireless communications infrastructure
Vulnerability is a weakness which allows an attacker to reduce a system's information assurance.
released sensitive data
carry and install malware on any computing device configured to receive it.
Threat analysis and countermeasures of the wireless communication
Threat
include physical and software threats compromise the data on mobile devices.
Threat include everything from mobile forms of malware and spyware to potential for unauthorized access to a device's data.
Countermeasures
Encrypt all data transmitted through your access point.
Use firewalls on each network access point.
Install security updates as soon as they are available.
Install antivirus software on the wireless computer.
Threat vector scenarios in Wireless communications infrastructure.
The threat vectors include the device itself, the applications on the device, compromised web sites, wireless data connections, other users and organizations, the organization to which the device user belongs, and the service providers
Social Media Protection
While email remains a significant attack vector, 70% of social media scams were manually shared.
Attack scenarios in Wireless communications infrastructure.
All smartphones, as computers, are preferred targets of attacks.
These attacks exploit weakness inherent in smartphones that can come from the communication mode.
:pencil2: SMS, MMS WIFI, Bluetooth and GSM