From the course: CompTIA Security+ (SY0-601) Cert Prep: 8 Network Security Design and Implementation
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Propagation attacks
From the course: CompTIA Security+ (SY0-601) Cert Prep: 8 Network Security Design and Implementation
Propagation attacks
- [Narrator] The open nature of wireless networks makes them perfect targets for attacks that prey upon radio wave propagation. Attackers can simply use strong antennas and pull signals out of the air for analysis. Let's talk about a few wireless attacks based upon radio wave propagation. Jamming and interference attacks seek to deny users legitimate access to a wireless network. Attackers don't try to gain access to the network itself or eavesdrop on communications in this attack. They simply want to stop other people from using the network. In a jamming attack, the attacker brings a powerful transmitter into the vicinity of the wireless network and broadcasts a very strong signal that overpowers the legitimate wireless access points. It's the equivalent of placing someone in a crowded stadium and asking them to have a conversation with someone located a few feet away. The noise overwhelms the conversation. In…
Contents
-
-
-
-
-
-
-
-
-
(Locked)
Denial of service attacks4m 15s
-
(Locked)
Eavesdropping attacks4m 12s
-
(Locked)
DNS attacks3m 30s
-
(Locked)
Layer 2 attacks2m 3s
-
(Locked)
Network address spoofing3m 38s
-
(Locked)
Wireless attacks2m 59s
-
(Locked)
Propagation attacks4m 19s
-
(Locked)
Preventing rogues and evil twins2m 50s
-
(Locked)
Disassociation attacks2m 10s
-
(Locked)
Understanding Bluetooth and NFC attacks2m 2s
-
(Locked)
RFID security2m 25s
-
(Locked)
-
-
-