Please enable JavaScript.
Coggle requires JavaScript to display documents.
VULNERABILITEIES &THREATS OF WIRELESS COMMUNICATION (WLAN…
VULNERABILITEIES &THREATS OF WIRELESS COMMUNICATION
WLAN VULNERABILITIES
The easy installation and use of an AP
This vulnerability allows any individual to introduce an unauthorized wireless network in unauthorized areas.
The AP configuration
If the AP is poorly configured or unauthorized, then it can provide an open door to attackers.
Physical security of an authorized AP.
An AP has to be correctly placed and physically protected in order to avoid accidental damage
Signal range of an authorized AP.
the AP’s placement and the signal strength have to be closely studied to make sure that the transmitting coverage of the AP is just enough to cover the required area and does not extend out of this area.
Rogue AP.
allows an attacker to place an unauthorized (or rogue) AP on the network area and configure it to look legitimate to the network users to gain access to a wireless user’s sensitive data.
Protocol weaknesses and capacity limits on authorized APs
These vulnerabilities can cause Denial of Service attacks (DoS) from malicious users utilizing unauthorized APs when they can flood authorized AP with traffic forcing them to reboot or deny accesses.
Cellular System Vulnerabilities
Service interruption vulnerabilities:
decreased the number of switches and enhanced their capacities, and increased the vulnerability of telecommunication infrastructures.
Handset vulnerabilities:
implementation of security mechanisms can present some weaknesses allowing attackers to launch successful attacks.
Radio link protection-only vulnerability:
anyone may attempt to access the network at this moment and get the message during transformation.
Particular threats of the wireless communication are :
i. device theft
ii. malicious hacker
iii. malicious code
iv. and theft of service
Threats
Application-Based Threats
posed by executable malicious codes that are inserted into existing or new wireless applications.
pretended to convert the shareware specific game program into a registered version.
Content-Based Threats
sending infected email messages from affected computers.
ability of a malicious code to hit the wireless infrastructure and spread with a considerable speed.
Mixed Application Threats
can cause damage to any mobile station it visits, and spreads across very large areas over a limited period of time.