Jump to content
Aerosol

Open Wi-Fi hotspots- Threats and Mitigations

Recommended Posts

Table of Contents
I. Introduction: .......................................................................................................................... 1
II. Threats posed to business professionals by open Wi-Fi hotspots...................................... 2
A. Most common threats to devices connected to open Wi-Fi hotspots....................................3
1. Types and description of threats................................................................................... 3
2. Basic security measures:................................................................................................ 3
B. Evil Twin............................................................................................................................................4
1. What is an evil twin?...................................................................................................... 4
2.Effects of evil-twin attack on the end user...............................................................................6
III. The repercussions of lack of a sound security for the Wi-Fi.......................................... 6
A.The after-effects of being a victim of cyber-crime....................................................................6
1. Loss of money to restore the system to its original state: ........................................... 6
2. Loss of time in retrieving back the lost/damaged/misused data:............................... 6
IV. Measures to mitigate evil twin attacks............................................................................. 7
A.WPA-PSK method:..........................................................................................................................7
B. Using a Virtual Private Network: ................................................................................................7
C. Awareness of cyber security ........................................................................................................12
D.Introducing the concept of basics of cyber-security to students at an earlier age. .........14
V. The perks of upgrading to stronger security measures as mentioned above:.................. 15
A.Increases the productivity of an organization and reduces the avoidable expenses. .....15
B. Beneficial to end-users as their private data is kept private and unaffected. ..................15
C.Works towards building a better and a robust security system throughout. ..................15
VI. Conclusion:............................................................................................................................ 15
VII. References:........................................................................................................................... 17

Source

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...