6 Wireless Threats to Your Business

نویسندگان

  • Greg Phillips
  • Mike Klein
چکیده

If you think a promiscuous client is a scantily-dressed customer, you're in trouble. And I'm not talking about having an affair. Think an evil twin is a horror-movie villain? Wrong again. The horror you should be bracing yourself for is not on the silver screen — and it's not from a rolling pin flung at you from across the kitchen, for that matter. Rather, the trouble is in the airwaves and targeted to Wi-Fi users. Both the "Promiscuous Client" and the "Evil Twin" are two of the latest wireless threats to your small business. If you haven't heard of them, you probably will soon. "What would happen to your business if your strongest competitor gained access to all of your data?" asks Greg Phillips, chief executive for AirTegrity Wireless, Inc., a Stateline, Nev. wireless security company. "Unfortunately, it is a very real possibility if appropriate controls against these new threats are not exercised." So what's out there? The Evil Twin. One of the most popular new threats to Wi-Fi users is the Evil Twin, sometimes referred to as WiPhishing. It's a rogue access point that replicates another network name, such as that of a

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Computer security threats faced by small businesses in Australia

In this paper, an overview is provided of computer security threats faced by small businesses. Having identified the threats, the implications for small business owners are described, along with countermeasures that can be adopted to prevent incidents from occurring. The results of the Australian Business Assessment of Computer User Security (ABACUS) survey, commissioned by the Australian Insti...

متن کامل

Personal Area Connectivity with Bluetoothtm Wireless Technology

Imagine the following scenario. You return to your office from a severalday-long regional meeting. On entering your office, you wirelessly synchronize recent appointments and e-mails on your personal digital assistant (PDA) with your docked notebook computer. You sit down, lean back in your chair with a wireless keyboard in your lap, and begin work at your notebook computer. You receive a call ...

متن کامل

Intrusion Detection in Wireless Sensor Networks using Genetic Algorithm

Wireless sensor networks, due to the characteristics of sensors such as wireless communication channels, the lack of infrastructure and targeted threats, are very vulnerable to the various attacks. Routing attacks on the networks, where a malicious node from sending data to the base station is perceived. In this article, a method that can be used to transfer the data securely to prevent attacks...

متن کامل

Wireless Fidelity Real Time Security System

This paper describes about how you can secure your Wireless Network from hackers about various threats to wireless networks, How hackers makes most use of it and what are the security steps one should take to avoid becoming victim of such attacks. There are plenty of opportunities to connect to public Wi-Fi hotspots when you're on the go these days. Coffee shops, hotels, restaurants and airport...

متن کامل

The Proliferation of Wireless Devices and its Role in Corporate Governance

This paper discusses the need to consider possible risks to ensure business survival and business continuity before the implementation of new technologies, with specific interest to wireless networks and wireless devices. Information Technology is fast becoming essential within business processes and is considered a technical issue yet neglected at board level. In recent years, there has been a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016