Word Notes

Encore: rogue access point (noun)


Listen Later

1. A wireless access point installed by employees in an office or data center environment as a convenience to connectivity without the consent or the knowledge of the network manager. 2. A wireless access point, sometimes called an Evil Twin, installed by a cyber adversary in or near an office or data center environment designed to bypass security controls, gain access, and/or surveil the network traffic of the victim’s network. Both kinds, the employee installed and the adversary installed rogue access points, increase the attack surface of the organization. The employee installed device, because of its electronic footprint range, might make it easier for hackers and mischief makers outside of the organization’s network to bypass the corporate security controls and gain access without permission. The adversary installed device is designed specifically to bypass the security controls of the target network.

Learn more about your ad choices. Visit megaphone.fm/adchoices

...more
View all episodesView all episodes
Download on the App Store

Word NotesBy N2K Networks

  • 5
  • 5
  • 5
  • 5
  • 5

5

18 ratings


More shows like Word Notes

View all
Security Now (Audio) by TWiT

Security Now (Audio)

1,971 Listeners

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast) by Johannes B. Ullrich

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

627 Listeners

CyberWire Daily by N2K Networks

CyberWire Daily

1,006 Listeners

The Defender's Advantage Podcast by Mandiant

The Defender's Advantage Podcast

32 Listeners

Smashing Security by Graham Cluley & Carole Theriault

Smashing Security

310 Listeners

Click Here by Recorded Future News

Click Here

406 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

7,873 Listeners

Cybersecurity Today by Jim Love

Cybersecurity Today

167 Listeners

CISO Series Podcast by David Spark, Mike Johnson, and Andy Ellis

CISO Series Podcast

187 Listeners

Hacking Humans by N2K Networks

Hacking Humans

314 Listeners

Caveat by N2K Networks

Caveat

92 Listeners

Cyber Security Headlines by CISO Series

Cyber Security Headlines

127 Listeners

8th Layer Insights by Perry Carpenter | N2K Networks

8th Layer Insights

56 Listeners

The AI Fix by Graham Cluley and Mark Stockley

The AI Fix

25 Listeners

The FAIK Files by Perry Carpenter | N2K Networks

The FAIK Files

12 Listeners