answersLogoWhite

0


Best Answer

Non-existant or weak encryption on the Wifi Access Point (Router) will allow unauthorized parties to access your network through Wifi. Poor or non-existent firewalling will allow some parties to attack your network from the internet, and poor computer security (updates, antivirus, antimalware) can allow an attacker to exploit your computer or network through software flaws and user error.

User Avatar

Wiki User

10y ago
This answer is:
User Avatar
More answers
User Avatar

Wiki User

9y ago

David is spot on with his answers but there are also some other things that he didn't mention that can allow unauthorized access. For example, if the network engineer does not set up MAC address filtering, then that can allow anyone to connect. Further, if one does not set up time restrictions for access to the network, then that can also allow nefarious users access. Also, if one does not have some sort of login process for gaining access to network drives, then one can waltz right on in and start rifling through the files on the network drives without any problems. Beyond all this, one can also set up Virtual LANs (VLANs) that keep those who gain wireless access to the network restricted from going into any other part of the network.

In networks that I set up for businesses, I generally configure at least the VLANs, preferably MAC filtering and time restrictions so as to keep things as well protected as necessary. Further, there are required logins for the network drives that automatically time out after the schedule expires for the day or if the machine is left dormant for a certain amount of time. So, even if someone does stumble across a known working network login, beyond its allowed login times, it will not work anyway.


Generally, hackers look for easy targets, so if they come across something that gives them so few chances to log in due to the restrictions I have mentioned, they will just move on and look for some network that is easier to access.

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What condition can allow unauthorized access to a network for users who are not physically connected to the network?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

When designing an end-system network topology diagram what should you ensure it includes?

Components of network device configurations How end systems are logically connected to a network How end systems are physically connected to a network


When designing an end system network topology diagram what should you ensure it encludes?

Components of network device configurations, How end systems are logically connected to a network, How end systems are physically connected to a network.


Where can you purchase rouge access points?

A rogue access point is a wireless access point that is not authorized or controlled by the administrators of the network that it is connected to. Depending on the intended usage, it may or may not use the same SSID as the legitimate access points on the network. Rogue access points are considered a security risk, either because they can allow unauthorized access to the network, or because they may be connected through a sniffer in order to capture network traffic passing through them. Any access point can be considered a rouge access point if connected to the network in an unauthorized manner.


What is a remote terminal?

A remote terminal is a computer connected to a network, but is not physically in the same building as the rest of the computers on the network. For example, it might be a computer at the home of a business employee, connected over a secure link to their place of work.


What hardware does each PC need in order to be physically connected to the switch?

I guess you are talking about a network switch. You would need a NIC, Network Interface Card, and a cable.


How do you connect to your work web based server?

If the server is publicly accessible, type in its domain name from any computer connected to the internet. If it is local to the organization, you must be physically or virtually connected to the network. This means you must be on the corporate network, or have a VPN connection into the corporate network.


What is prevent the unauthorized network access?

firewall


Is Ethernet more secure?

Ethernet is more "physically secure", in that it is sometimes more difficult to gain unauthorized access to a network, since you need to be in close physical proximity to a network cable. However, it does not require any form of cryptographic authentication to connect to a network, which can be optionally provided by wireless.


Which access using to prevented Unauthorized network?

Firewall


What includes all measures to detect unauthorized network activity?

Computer network defense


Includes all measures to detect unauthorized network activity?

Computer network defense


What is the difference between unauthorized access and unauthorized use?

Unauthorized access is the use of a computer or network without permission. Unauthorized use is the use of a computer or its data for unapproved or possibly illegal activities.