Rogue Wireless Device

Definition - What does Rogue Wireless Device mean?

A rogue wireless device is a wireless device that remains connected to a system but does not have permission to access and operate in a network. Rogue wireless devices may be access points (rogue access points or rogue APs) or end user computers (rogue peers). If left connected, both types can pose security threats to networks and organizations.

Techopedia explains Rogue Wireless Device

A rogue wireless device is one of the leading security threats in wireless networking. It has the ability to disclose confidential system information that is potentially damaging to an organization.

Access point (AP)-based rogue devices are wireless access points (WAP) installed in a network without authorization. These routers may be installed by an employee for work purposes, or by a hacker for the collection of private records. In most cases, the use of such devices conflicts with network security policies, and the devices are not managed by the network administrator (NA). Additionally, rogue APs may allow other unauthorized end user devices to connect to the network and consume network bandwidth.

Computer-based rogue threats, or rogue peers, are end user computers that are connected to a network without permission. These devices are usually laptops and netbooks that can serve as APs. Rogue peers pose more risks than rogue APs, given that laptops have little to no security features. This can allow other unauthorized devices to connect to the device and network.

Rogue wireless device threats can be prevented by using strict network security policies. All APs and end user computers should be mapped in the network, allowing easy detection of new devices. Rogue wireless devices are easily detectable but difficult to eliminate.

Share this:

Connect with us

Email Newsletter

Join thousands of others with our weekly newsletter

The 4th Era of IT Infrastructure: Superconverged Systems
The 4th Era of IT Infrastructure: Superconverged Systems:
Learn the benefits and limitations of the 3 generations of IT infrastructure – siloed, converged and hyperconverged – and discover how the 4th...
Approaches and Benefits of Network Virtualization
Approaches and Benefits of Network Virtualization:
Businesses today aspire to achieve a software-defined datacenter (SDDC) to enhance business agility and reduce operational complexity. However, the...
Free E-Book: Public Cloud Guide
Free E-Book: Public Cloud Guide:
This white paper is for leaders of Operations, Engineering, or Infrastructure teams who are creating or executing an IT roadmap.
Free Tool: Virtual Health Monitor
Free Tool: Virtual Health Monitor:
Virtual Health Monitor is a free virtualization monitoring and reporting tool for VMware, Hyper-V, RHEV, and XenServer environments.
Free 30 Day Trial – Turbonomic
Free 30 Day Trial – Turbonomic:
Turbonomic delivers an autonomic platform where virtual and cloud environments self-manage in real-time to assure application performance.