Aerosol Posted January 22, 2015 Report Posted January 22, 2015 Table of ContentsI. Introduction: .......................................................................................................................... 1II. Threats posed to business professionals by open Wi-Fi hotspots...................................... 2A. Most common threats to devices connected to open Wi-Fi hotspots....................................31. Types and description of threats................................................................................... 32. Basic security measures:................................................................................................ 3B. Evil Twin............................................................................................................................................41. What is an evil twin?...................................................................................................... 4 2.Effects of evil-twin attack on the end user...............................................................................6III. The repercussions of lack of a sound security for the Wi-Fi.......................................... 6A.The after-effects of being a victim of cyber-crime....................................................................61. Loss of money to restore the system to its original state: ........................................... 62. Loss of time in retrieving back the lost/damaged/misused data:............................... 6IV. Measures to mitigate evil twin attacks............................................................................. 7A.WPA-PSK method:..........................................................................................................................7B. Using a Virtual Private Network: ................................................................................................7C. Awareness of cyber security ........................................................................................................12D.Introducing the concept of basics of cyber-security to students at an earlier age. .........14V. The perks of upgrading to stronger security measures as mentioned above:.................. 15A.Increases the productivity of an organization and reduces the avoidable expenses. .....15B. Beneficial to end-users as their private data is kept private and unaffected. ..................15C.Works towards building a better and a robust security system throughout. ..................15VI. Conclusion:............................................................................................................................ 15VII. References:........................................................................................................................... 17Source Quote