add content rogue-access-point@Ee7LfbhwJbiWjJ3b_bbni.md (#6799)
* add content rogue-access-point@Ee7LfbhwJbiWjJ3b_bbni.md * Update src/data/roadmaps/cyber-security/content/rogue-access-point@Ee7LfbhwJbiWjJ3b_bbni.md new line --------- Co-authored-by: dsh <daniel.s.holdsworth@gmail.com>pull/6824/head
parent
24c1c69515
commit
b260476813
1 changed files with 8 additions and 0 deletions
@ -0,0 +1,8 @@ |
|||||||
|
# Rogue Access Point |
||||||
|
|
||||||
|
A Rogue Access Point (Rogue AP) is an unauthorized wireless access point installed on a secure network without the network administrator's knowledge or consent. These devices can be set up by malicious actors to intercept, steal, or manipulate network traffic, or by employees who unintentionally compromise network security by setting up their own wireless access points. |
||||||
|
|
||||||
|
Visit the following resources to learn more: |
||||||
|
|
||||||
|
- [@article@Rogue access points](https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/a/rogue-access-points-mitm-attacks) |
||||||
|
|
Loading…
Reference in new issue