Please enable JavaScript.
Coggle requires JavaScript to display documents.
wireless vulnerabilities - Coggle Diagram
wireless vulnerabilities
Emanations
atmospheric conditions
Building materials
nearby devices
preshared KEY
common support and availability
Wi-FI
WIMAX
bluebugging
Bluetooth and Bluetooth low energy(BLE)
PAN
data transfer applications
wireless motions
wireless bridging
video game console
bluetooth security
bar code scanners
a replacement for infrared
war flying
wardroning
unsecured conections
low brandwidth network applications
discovering
trusted devices
discoverable devices
bluejacking
bluesnarfing
viruses and malware
securing bluetooth
working with radius
wireless lans
role of APs
CSMA/CD versus CSMA/CA
Service set identifier
AD hoc nertwork
infrasture network
wardriving
warwalking
war biking