Reference no: EM132267189
Chapter: Configuring Local Policies by Cisco
HTG Explains: The Difference Between WEP, WPA, and WPA2 Wireless Encryption (and Why It Matters)
Prompt
Define and describe the following wireless local area network (WLAN) attacks: Rogue Access Points, Intercepting Wireless Data, and Wireless Replay Attack.
Discus the following risks and defenses of using near field communication attacks (NFC): eavesdropping, data manipulation, man-in-the-middle attack, and device theft. Provide examples of wireless local area network (WLAN) attacks and near field communication attacks in your discussion.
For your citation, you might use articles that show examples of wireless networking and the troubleshooting methods for protecting networks.
You can also find articles from experts that suggest wireless controls and security standards for protecting against war chalking, war driving, bluejacking, bluesnarfing, and RF jamming.
Your initial and reply posts should work to develop a group understanding of this topic. Challenge each other. Build on each other. Always be respectful but discuss this and figure it out together.