0% found this document useful (0 votes)
97 views3 pages

Worksheet #2: Mobile Security

The document provides information about mobile security risks and attacks on different wireless networks. It discusses Wi-Fi networks, Bluetooth attacks, and different mobile device types. It explains that on unprotected Wi-Fi networks, attackers can view transmitted data, inject malware, or access other devices on the home network. When using public Wi-Fi, there are risks of an "evil twin" attack and of transmissions being intercepted. Bluetooth attacks like "bluejacking" and "bluesnarfing" are also discussed.

Uploaded by

Grace O. Yanson
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
97 views3 pages

Worksheet #2: Mobile Security

The document provides information about mobile security risks and attacks on different wireless networks. It discusses Wi-Fi networks, Bluetooth attacks, and different mobile device types. It explains that on unprotected Wi-Fi networks, attackers can view transmitted data, inject malware, or access other devices on the home network. When using public Wi-Fi, there are risks of an "evil twin" attack and of transmissions being intercepted. Bluetooth attacks like "bluejacking" and "bluesnarfing" are also discussed.

Uploaded by

Grace O. Yanson
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

WORKSHEET #2: MOBILE SECURITY

Name: Score:
Date:

Mobile Attacks
There are several types of attacks that are directed toward mobile devices. There are two major types of wireless networks that are popular today and
they also are targets for attackers. These networks are 1).____________ and 2. ________________.

Wi-fi networks have become commonplace today. Understanding what Wi-fi is, the equipment to operate on a Wi-fi network, and the attacks that this
type of network faces are all important.
What is Wi-fi ? (1)____________________________________________________________________________________________________________
This type of network is technically (2) ________________ and is intended to replace or supplement a (3) ________________.
Devices such as tablets, laptop computers, (3) _______________, (4) ______________ that are within 460 feet ( 140 meters) of a centrally located connection
device can send and (6) ______________ information using RF( radio frequency) transmissions at speeds that typically range from 54 million bits per second to
as high as 7 billion bits per second .
The list of equipment needed for a Wi-fi wireless network is short. Each mobile device must have a (7) _________________________ to send and
receive the wireless signal. Although early wireless adapters were external devices that connected to the computer’s USB and had an external antenna, today
they are internal and built into mobile devices. In addition, special (8) __________ is needed that translates data between the wireless adapter and the device.
All OSs today include this software that will automatically 1.) scan the airwaves, 2.) detect any Wi-fi networks in the area and (9)
3.)_________________________________________ or automatically connect based on previous preferences by the user.
The other equipment needed for a home-based Wi-fi network combines several networking technologies. Strictly speaking these devices are residential
WLAN gateways as the entry point from the Internet into the Wi-fi network. However, most vendors instead choose to label their products as wireless routers.
The wireless router acts as the base station for the wireless devices, sending and receiving wireless signals between all devices as well as providing gateway to
the external (10) ______________.

(11)________

(12)
__________

(13)
__________

Figure 1.
A home wifi network is shown in Figure 1. The RF transmission signal from the wireless router allows the (14) ____________ and (15) __________ to (16)
__________ connect. The (17) _____________ in return is connected to all other devices as well as the (18) __________. Because the wireless router supports
both wired devices like (19) ____________ and (20)____________ as well as wireless devices, this enables all the devices to equally share (21) _____________.
For example, the wireless tablet can print to the wired printer, and all wired and wireless devices can share the single Internet connection.

Home users face several risks from attacks on their Wi-fi networks such as (A) Reading Wireless transmissions, (b) viewing or stealing computer data, (c) injecting
malware and (d) downloading harmful content.

(22)_____ Attackers have accessed a home computer through unprotected Wi-fi network, downloaded pornography to the computer and then turned that
computer into a file server to distribute the content.
(23)_____ Attackers access the network behind a firewall and insert Trojan onto the user’s computer.
(24)_____ The attacker is able to coonect to a home Wi-fi network and access any folder that has the file sharing enabled on any computer on the network and
take sensitive data from all computers on the network.
(25)_____ Usernames, passwords, credit card numbers are sent over the Wi-fi network could be easily seen by an attacker.

When using a public Wi-fi network in a coffee shop, airport or school campus there are also security concerns. First, these networks are rarely protected, so
attackers can read any wireless transmissions sent to and from the user’s device. In addition, an attacker can set up an evil twin. An evil twin is an AP designed to
mimic an authorized Wi-fi device. A user’s mobile device may unknowingly connect to this evil twin instead of authorized device so that attackers can receive any
sensitive transmissions.

Bluetooth is another widespread wireless technology. Bluetooth is a short-range wireless technology designed for (26) _______________ or interconnecting of
two or more devices together. Two Bluetooth attacks are (B1)bluejacking and(B2)bluesnarfing.

(26)________ An attack that accesses unauthorized information from a wireless device through a Bluetooth connection, often between cellphones and laptop.
(27)________ An attack that sends unsolicited messages to Bluetooth-enabled devices.

(28)________ are portable computing devices that are generally larger than smartphones and smaller than laptops and are focused on ease of use. Designed for
user convenience. It has OS that allows them to run other software.

(29) _________ is a traditional cellular telephone that includes a limited number of features, such as camera, an MP3 and ability to send and receive SMS text
messages. It has all the tools that a feature phone has an OS that allows it to run apps and access the Internet.

(30) ________________ is a new class of mobile technology that consists of devices that can be worn by the user instead of carried. Examples are fitness tracker,
which monitor movements by counting steps and distance travelled, record heart rates, provide location data give alerts of incoming email, calls or text
messages.
Configuring a Wireless Router using an Online emulator

Creating and Using QR Codes

Download and Install a wireless Monitor

Software to locate a Missing Laptop

Configuring a Wireless Router using an Online emulator

Creating and Using QR Codes

Download and Install a wireless Monitor

Software to locate a Missing Laptop

Configuring a Wireless Router using an Online emulator

Creating and Using QR Codes

Download and Install a wireless Monitor

Software to locate a Missing Laptop

You might also like