Page 30 - CyberSecurityEssentialsEnglish
P. 30
✓ Evil Twin Attacks: An attacker acquires knowledge about a public network access point and configures
his machine to imitate it in an evil twin assault. Unknowingly users connect using the adversary's
broadcast signal, which is more substantial than the one produced by the actual access point (figure
18).
Figure 18 Evil Twin Attacks
✓ Unauthorized Computer Access: A hostile person might access any folders and files you mistakenly make
available for sharing via an unprotected public wireless network and unsecured file sharing.
✓ Wireless Sniffing: Several public access points lack security that could be attained through traffic encryption,
for instance; therefore, your confidential conversations may be at risk while your connection is broadcast "in
the clear," making it possible for unscrupulous parties to employ sniffing tools to gather private data like
passwords and credit card details (figure 19).
Figure 19 Wireless Sniffing
Shoulder Surfing: Criminal individuals can quickly peek over your shoulder while you type in public places (figure 20).
They can steal private or sensitive information by just monitoring you.
28

