|
|
|
Denial of
service due to radio interference or malicious users:
|
|
-interference transmitters
|
|
-Bluetooth
|
|
-other 2.4 GHz band radio traffic
|
|
-ping floods
|
|
-injecting dynamic routing announcements
|
|
|
|
Unauthorized or
unaccounted access to the network and Internet:
|
|
-evil crackers may use the network as a nice way
to hide (use another user’s id, IP and MAC address) and do some cracking
|
|
-ISP however has to be able to track these
crackers when needed to be able to function with other operators. Operator
that clearly lacks any security loses probably peering agreements or other
connectivity quite fast
|
|
|
|
Eavesdropping
and recording other users’ traffic
|
|
-eavesdropping network management traffic
|
|
-injecting dynamic routing announcements
|
|
|