From b260476813515c27724c6ec15cdd168aee8f3682 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Jes=C3=BAs=20Enrique=20Alcal=C3=A1=20Rojas?= Date: Tue, 27 Aug 2024 04:14:57 -0400 Subject: [PATCH] add content rogue-access-point@Ee7LfbhwJbiWjJ3b_bbni.md (#6799) * add content rogue-access-point@Ee7LfbhwJbiWjJ3b_bbni.md * Update src/data/roadmaps/cyber-security/content/rogue-access-point@Ee7LfbhwJbiWjJ3b_bbni.md new line --------- Co-authored-by: dsh --- .../content/rogue-access-point@Ee7LfbhwJbiWjJ3b_bbni.md | 8 ++++++++ 1 file changed, 8 insertions(+) diff --git a/src/data/roadmaps/cyber-security/content/rogue-access-point@Ee7LfbhwJbiWjJ3b_bbni.md b/src/data/roadmaps/cyber-security/content/rogue-access-point@Ee7LfbhwJbiWjJ3b_bbni.md index e69de29bb..0f8c26081 100644 --- a/src/data/roadmaps/cyber-security/content/rogue-access-point@Ee7LfbhwJbiWjJ3b_bbni.md +++ b/src/data/roadmaps/cyber-security/content/rogue-access-point@Ee7LfbhwJbiWjJ3b_bbni.md @@ -0,0 +1,8 @@ +# Rogue Access Point + +A Rogue Access Point (Rogue AP) is an unauthorized wireless access point installed on a secure network without the network administrator's knowledge or consent. These devices can be set up by malicious actors to intercept, steal, or manipulate network traffic, or by employees who unintentionally compromise network security by setting up their own wireless access points. + +Visit the following resources to learn more: + +- [@article@Rogue access points](https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:cyber-attacks/a/rogue-access-points-mitm-attacks) +