Page 30 - CyberSecurityEssentialsEnglish
P. 30

✓  Evil Twin Attacks: An attacker acquires knowledge about a public network access point and configures
               his machine to imitate it in an evil twin assault. Unknowingly users connect using the adversary's
               broadcast signal, which is more substantial than the one produced by the actual access point (figure
               18).
































                                                  Figure 18 Evil Twin Attacks

           ✓  Unauthorized  Computer  Access:  A  hostile  person might  access  any  folders  and  files you mistakenly make
               available for sharing via an unprotected public wireless network and unsecured file sharing.
           ✓  Wireless Sniffing: Several public access points lack security that could be attained through traffic encryption,
               for instance; therefore, your confidential conversations may be at risk while your connection is broadcast "in
               the clear," making it possible for unscrupulous parties to employ sniffing tools to gather private data like
               passwords and credit card details (figure 19).






















                                                  Figure 19 Wireless Sniffing

       Shoulder Surfing: Criminal individuals can quickly peek over your shoulder while you type in public places (figure 20).
       They can steal private or sensitive information by just monitoring you.







          28
   25   26   27   28   29   30   31   32   33   34   35