terça-feira, 11 de junho de 2019

9

Valuable, sensitive data appears to have been stored from the organization.

Investigation shows no apparent successful attacks against the business infrastructure over several months.

During the investigationn, a user returns a laptop found to hold the sensitive information on it.

When required, she admitted to using the laptop after work at a local Starbucks while having an afternnon coffe.

Which of the following attacks did she most likely fall victim of?


Honeyspot

Facking a well-known hotspot on a rogue AP(such as McDonald`s or Starbucks free Wi-Fi spots)
is referred to as a "honeyspot" attack.


Other names for this include rogue access point and "mis-association".



Starbucking and misappropriation are not wireless attacks (even though they sound cool enought to be).


BYOD refers to "bring your own device"


which is a work policy allowing personal mobile devices to access the corporate network

Sem comentários:

Enviar um comentário