Wireless Local Area Network (WLAN): Security Risk Assessment
and Countermeasures Nwabude
Arinze Sunday - 31
-Once succeeded, the attacker impersonates (masquerading)
as an authorized user, thereby gaining certain unauthorized privileges. More on masquerading
can be found on section 4.1.1.
Share with your friends: