Computer Networking Security Beginners Guide: The Guide to CyberSecurity to Learn through a Top-Down Approach all the Defensive Actions to be taken to Protect yourself from the Dangers of the Network by Morgan Kevin
Author:Morgan, Kevin [Morgan, Kevin]
Language: eng
Format: epub
Published: 2019-11-23T16:00:00+00:00
Free Wi-Fi networks
The hunting grounds preferred by crackers are free Wi-Fi networks, i.e. not for a fee.
Free Wi-Fi networks are easy to access and there is no risk of being identified.
In fact, in these networks, the cracker can perform a MitM attack "Man in the middle". It consists of letting the bad person think that he is connected to the Wi-Fi, while in reality its data flow passes through the cracker's computer. In turn, the cracker, after checking and recording this data, passes it on to the hotspot, making the person who happened to be connected directly to the Wi-Fi network believe he is.
The worst case is when the hotspot is under the control of the cracker or even was created by it to attack all those who will connect. In this case, the cracker has control of the router. A trap of this kind is called a "honeypot".
There are also hardware devices capable of intercepting devices that try to connect to the free Wi-Fi network, and that respond to the connection attempt by pretending to be the desired network.
Finally, it is possible that they will connect to the network computers already infected with malware and will try to transmit the virus to all other connected terminals.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7411)
Grails in Action by Glen Smith Peter Ledbrook(7305)
Kotlin in Action by Dmitry Jemerov(4654)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4138)
The Age of Surveillance Capitalism by Shoshana Zuboff(3432)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3253)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3035)
Mastering Python for Networking and Security by José Manuel Ortega(2965)
Blockchain Basics by Daniel Drescher(2896)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(2702)
TCP IP by Todd Lammle(2647)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(2534)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2487)
Hands-On Azure for Developers by Kamil Mrzyglod(2431)
Azure Containers Explained by Wesley Haakman & Richard Hooper(2422)
React Native - Building Mobile Apps with JavaScript by Novick Vladimir(2345)
MCSA Windows Server 2016 Study Guide: Exam 70-740 by William Panek(2318)
The Social Psychology of Inequality by Unknown(2317)
The Art Of Deception by Kevin Mitnick(2305)