Information Technology Reference
In-Depth Information
Wi-Fi Networks
Hackers frequently target Wi-Fi networks. When Wi-Fi networks are
not properly secured, it is easy to steal data on them with little chance of
being caught. Hackers don't even need any special equipment to pen-
etrate such a Wi-Fi network.
When people use their devices
to locate and connect to a
wireless network, they see a
list of available networks, as
shown in Figure 11.5. Some
of these networks may be open
access, meaning you don't
need a password to connect.
Others may require a password
and will provide users with a
secure connection. Insecure
networks are identified with
a small exclamation mark; the
other networks have encrypted
connections.
Some wireless networks
appear to be genuine, but in
fact attempt to intercept your
traffic. These types of Wi-Fi
networks are called rogue
Wi-Fi . These Wi-Fi networks
usually seem authentic, often with a name that is similar or the same as a
legitimate network. The difference? This network “sniffs” all your traffic,
making a copy of everything you type—including any usernames, pass-
words, and credit card numbers.
rogue Wi-Fi A wireless network that “sniffs”
traffic, making a copy of everything users type—
including usernames, passwords, and credit card
numbers.
Figure.11 5 Visible wireless networks.
Public places where many people are looking for Wi-Fi, such as coffee
shops, restaurants, and airports, are common locations for rogue Wi-Fi
connections. How can you tell whether a Wi-Fi network to which you
want to connect is in fact rogue? It's not easy. If you are directed to a
“Terms of Service” page after you connect, that's a good indication that
the network is legitimate. A time limit is another sign that the net-
work may be genuine. But your best bet is to simply ask someone who
works at the location whether it offers Wi-Fi, and if so, the name of the
network.
Quick Review
1  What are the three goals of computer security?
2  What are two ways to detect a phishing attack?
3  What are the three main types of malware?
4  What is the best protection against malware?
Search WWH ::




Custom Search