Rogue Peer
Related question
What is peer-to-peer content distribution?Techopedia explains Rogue Peer
Rogue peers are essentially holes in a network where malicious entities may gain access. Wireless routers or access points are configured with authentication protocols like wired-equivalent privacy (WEP) and Wi-Fi protected setup (WPS), and may even have firewalls. Laptops or wireless devices with rogue peers may not be configured as such and can act as an open door to an otherwise secure network. They are not considered part of the network infrastructure, and are therefore considered rogues.
Because a rogue peer is a device not really meant as an access point, the vulnerability that it poses to the network is much more severe than that of a rogue access point because these will at least have built-in security features that may have been enabled by default.
Survey: Why Is There Still a Gender Gap in Tech?
Do you work in the tech industry? Help us learn more about why the gender gap still exists in tech by taking this quick survey! Survey respondents will also be entered to win a $100 Amazon Gift Card!
Related Reading
- The 3 Key Components of BYOD Security
- The Device You Don't Think About: Security Tips for Tablet PCs
- The New Frontier for Hackers: Your Smartphone
- Data Breach Notification: The Legal and Regulatory Environment
- Artificial Intelligence in Cybersecurity
- The Differences Between the Top 3 Cryptocurrencies