Tech moves fast! Stay ahead of the curve with Techopedia!
Join nearly 200,000 subscribers who receive actionable tech insights from Techopedia.
Access point (AP)-based rogue devices are wireless access points (WAP) installed in a network without authorization. These routers may be installed by an employee for work purposes, or by a hacker for the collection of private records. In most cases, the use of such devices conflicts with network security policies, and the devices are not managed by the network administrator (NA). Additionally, rogue APs may allow other unauthorized end user devices to connect to the network and consume network bandwidth.
Computer-based rogue threats, or rogue peers, are end user computers that are connected to a network without permission. These devices are usually laptops and netbooks that can serve as APs. Rogue peers pose more risks than rogue APs, given that laptops have little to no security features. This can allow other unauthorized devices to connect to the device and network.
Rogue wireless device threats can be prevented by using strict network security policies. All APs and end user computers should be mapped in the network, allowing easy detection of new devices. Rogue wireless devices are easily detectable but difficult to eliminate.