CWNA Chapter 14 – Wireless Attacks, Intrusion Monitoring and Policy

My Notes from chapter 14 of the CWNA study guide Wireless attacks Rogue wireless devices A potential open and unsecured gateway straight into the wired infrastructure that the company wants to protect. However, what is there to prevent an individual from installing their own wireless portal onto the network backbone? A rogue access point is …

Continue reading CWNA Chapter 14 – Wireless Attacks, Intrusion Monitoring and Policy