Valuable, sensitive data appears to have been stored from the organization.
Investigation shows no apparent successful attacks against the business infrastructure over several months.
During the investigationn, a user returns a laptop found to hold the sensitive information on it.
When required, she admitted to using the laptop after work at a local Starbucks while having an afternnon coffe.
Which of the following attacks did she most likely fall victim of?
Honeyspot
Facking a well-known hotspot on a rogue AP(such as McDonald`s or Starbucks free Wi-Fi spots)
is referred to as a "honeyspot" attack.
Other names for this include rogue access point and "mis-association".
Starbucking and misappropriation are not wireless attacks (even though they sound cool enought to be).
BYOD refers to "bring your own device"
which is a work policy allowing personal mobile devices to access the corporate network
Sem comentários:
Enviar um comentário