Rogue Wireless Device

What Does Rogue Wireless Device Mean?

A rogue wireless device is a wireless device that remains connected to a system but does not have permission to access and operate in a network. Rogue wireless devices may be access points (rogue access points or rogue APs) or end user computers (rogue peers). If left connected, both types can pose security threats to networks and organizations.


Techopedia Explains Rogue Wireless Device

A rogue wireless device is one of the leading security threats in wireless networking. It has the ability to disclose confidential system information that is potentially damaging to an organization.

Access point (AP)-based rogue devices are wireless access points (WAP) installed in a network without authorization. These routers may be installed by an employee for work purposes, or by a hacker for the collection of private records. In most cases, the use of such devices conflicts with network security policies, and the devices are not managed by the network administrator (NA). Additionally, rogue APs may allow other unauthorized end user devices to connect to the network and consume network bandwidth.

Computer-based rogue threats, or rogue peers, are end user computers that are connected to a network without permission. These devices are usually laptops and netbooks that can serve as APs. Rogue peers pose more risks than rogue APs, given that laptops have little to no security features. This can allow other unauthorized devices to connect to the device and network.

Rogue wireless device threats can be prevented by using strict network security policies. All APs and end user computers should be mapped in the network, allowing easy detection of new devices. Rogue wireless devices are easily detectable but difficult to eliminate.


Related Terms

Latest Cybersecurity Terms

Related Reading

Margaret Rouse

Margaret Rouse is an award-winning technical writer and teacher known for her ability to explain complex technical subjects to a non-technical, business audience. Over the past twenty years her explanations have appeared on TechTarget websites and she's been cited as an authority in articles by the New York Times, Time Magazine, USA Today, ZDNet, PC Magazine and Discovery Magazine.Margaret's idea of a fun day is helping IT and business professionals learn to speak each other’s highly specialized languages. If you have a suggestion for a new definition or how to improve a technical explanation, please email Margaret or contact her…