A computer supply company is located in a building with three wireless networks. The system security team
implemented a quarterly security scan and saw the following.
Which of the following is this an example of?
Rogue access point
Near field communication
The question states that the building has three wireless networks. However, the scan is showing four wireless
networks with the SSIDs: Computer AreUs1 , Computer AreUs2 , Computer AreUs3 and Computer AreUs4.
Therefore, one of these wireless networks probably shouldn’t be there. This is an example of a rogue access
A rogue access point is a wireless access point that has either been installed on a secure company network
without explicit authorization from a local network administrator, or has been created to allow a hacker to
conduct a man-in-the-middle attack. Rogue access points of the first kind can pose a security threat to large
organizations with many employees, because anyone with access to the premises can install (maliciously or
non-maliciously) an inexpensive wireless router that can potentially allow access to a secure network to
unauthorized parties. Rogue access points of the second kind target networks that do not employ mutual
authentication (client-server server-client) and may be used in conjunction with a rogue RADIUS server,
depending on security configuration of the target network.
To prevent the installation of rogue access points, organizations can install wireless intrusion prevention
systems to monitor the radio spectrum for unauthorized access points.