162k views
2 votes
What cybersecurity hazards might there be for users in the new wireless environment?

User Chris Cap
by
3.3k points

1 Answer

3 votes

Answer:

Step-by-step explanation:

spoofing and session hijacking - where the attacker gains access to network data and resources by assuming the identity of a valid user. eavesdropping - where unauthorised third-parties intercept the data being transmitted over the secure network.

User Mahmmoud Kinawy
by
3.4k points