Rogue Wireless Device
Techopedia Explains Rogue Wireless DeviceA rogue wireless device is one of the leading security threats in wireless networking. It has the ability to disclose confidential system information that is potentially damaging to an organization.
Access point (AP)-based rogue devices are wireless access points (WAP) installed in a network without authorization. These routers may be installed by an employee for work purposes, or by a hacker for the collection of private records. In most cases, the use of such devices conflicts with network security policies, and the devices are not managed by the network administrator (NA). Additionally, rogue APs may allow other unauthorized end user devices to connect to the network and consume network bandwidth.
Computer-based rogue threats, or rogue peers, are end user computers that are connected to a network without permission. These devices are usually laptops and netbooks that can serve as APs. Rogue peers pose more risks than rogue APs, given that laptops have little to no security features. This can allow other unauthorized devices to connect to the device and network.
Rogue wireless device threats can be prevented by using strict network security policies. All APs and end user computers should be mapped in the network, allowing easy detection of new devices. Rogue wireless devices are easily detectable but difficult to eliminate.
- Top 3 Wi-Fi Security Vulnerabilities
- How IoT Can Compromise Your Home's Safety and Security
- 5 Industries Facing Game-Changing 5G Transformation
- VPNs vs Proxies: What's Best for Business
- Insider Threat Awareness: Avoiding Internal Security Breaches
- 3 Amazing Examples of Artificial Intelligence in Action