 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
• |
Denial
of service due to radio interference or malicious
|
|
|
|
user
|
|
|
• |
Unauthorized
or unaccounted access to the network and
|
|
|
Internet
|
|
|
• |
Eavesdropping
and recording other users’ traffic
|
|
|
• |
Faked
servers and networks, intercepting other users’
|
|
|
|
traffic
|
|
|
• |
Network
performance loss due to extensive traffic using
|
|
|
private
network addresses and bypassing the security
|
|
|
|
gateway
|
|