Jump to content
Aerosol

Open Wi-Fi hotspots- Threats and Mitigations

Recommended Posts

Posted

Table of Contents
I. Introduction: .......................................................................................................................... 1
II. Threats posed to business professionals by open Wi-Fi hotspots...................................... 2
A. Most common threats to devices connected to open Wi-Fi hotspots....................................3
1. Types and description of threats................................................................................... 3
2. Basic security measures:................................................................................................ 3
B. Evil Twin............................................................................................................................................4
1. What is an evil twin?...................................................................................................... 4
2.Effects of evil-twin attack on the end user...............................................................................6
III. The repercussions of lack of a sound security for the Wi-Fi.......................................... 6
A.The after-effects of being a victim of cyber-crime....................................................................6
1. Loss of money to restore the system to its original state: ........................................... 6
2. Loss of time in retrieving back the lost/damaged/misused data:............................... 6
IV. Measures to mitigate evil twin attacks............................................................................. 7
A.WPA-PSK method:..........................................................................................................................7
B. Using a Virtual Private Network: ................................................................................................7
C. Awareness of cyber security ........................................................................................................12
D.Introducing the concept of basics of cyber-security to students at an earlier age. .........14
V. The perks of upgrading to stronger security measures as mentioned above:.................. 15
A.Increases the productivity of an organization and reduces the avoidable expenses. .....15
B. Beneficial to end-users as their private data is kept private and unaffected. ..................15
C.Works towards building a better and a robust security system throughout. ..................15
VI. Conclusion:............................................................................................................................ 15
VII. References:........................................................................................................................... 17

Source

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...