Shadow AP

From Cognitive Attack Taxonomy
Revision as of 04:58, 30 July 2024 by Info (talk | contribs) (Created page with "== '''Shadow AP ''' == '''Short Description:''' Intentional use of an unauthorized network access point (typically a wireless). <br> '''CAT ID:''' CAT-2022-231 <br> '''Layer:''' 9 <br> '''Operational Scale:''' Tactical <br> '''Level of Maturity:''' Observed in the Wild <br> '''Category:''' Vulnerability <br> '''Subcategory:''' <br> '''Also Known As:''' <br> == '''Description:''' == '''Brief Description:''' <br> '''Closely Related Concepts:''' <br> '''...")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Shadow AP

Short Description: Intentional use of an unauthorized network access point (typically a wireless).

CAT ID: CAT-2022-231

Layer: 9

Operational Scale: Tactical

Level of Maturity: Observed in the Wild

Category: Vulnerability

Subcategory:

Also Known As:

Description:

Brief Description:

Closely Related Concepts:

Mechanism:

Multipliers:

Detailed Description: Intentional use of an unauthorized network access (typically a wireless acces point) to acess organizational resources or accomplish organizational tasks and objectives.

INTERACTIONS [VETs]:

Examples:

Use Case Example(s):

Example(s) From The Wild:

Comments:

References: