An attacker has setup a fraudulent wireless access point on a company’s network that mimics one of the network’s legitimate access points. Through this fraudulent access point the attacker can gain access to the sensitive information transmitted by those who unwittingly connect to it. This fraudulent access point is known as what?
Rouge access point
|Threats, Vulnerabilities, and Mitigations
|Security Program Management and Oversight
|General Security Concepts