1 Wireless and Mobile Device Attack
1 Wireless and Mobile Device Attack
device attack
Cyber Security Essential
Jibril Dauda Muhammad
[email protected] | 08184018469
• The widespread use of the Internet and mobile devices means that
now, more than ever before, we can communicate and work on
the go, without the need for cables and wires! But this also breeds
more opportunity for cybercriminals to access the sensitive
information they are after.
Grayware and SMiShing
Grayware and SMiShing
• You are enjoying a coffee in the local cafe and decide to catch up on
your emails while you wait for your friend to arrive. You try to log on
to the café’s Wi-Fi but the connection looks very weak. Fortunately,
there is a second Wi-Fi with a similar name, so you log on to that.
• However, unknown to you, an attacker sits nearby, having created a
Wi-Fi hotspot on their mobile, which they have paired with their
laptop. They are monitoring the online activity of everyone who
connects to this Wi-Fi, including you — that wasn’t the café’s Wi-Fi
after all!
• What type of attack is this?
ANS
• There are several steps that organizations and users need to take to
defend against wireless and mobile device attacks. These include the
following:
• Take advantage of basic wireless security features such as
authentication and encryption by changing the default configuration
settings.
• Restrict access point placement by placing these devices outside the
firewall or within a demilitarized zone — a perimeter network that
protects an organization’s LAN from untrusted devices.
• Develop a policy for guest access to an organization’s Wi-Fi network.
• You have seen how cybercriminals are taking advantage of
vulnerabilities in wireless security. But they also use techniques to
exploit vulnerabilities in web applications and email browsers to
launch their attacks.
Q/A
|
END