Section outline

  • Lesson Overview: This lesson delves into securing wireless networks and mobile devices, the “pocket battlefields.” We address Wi-Fi security (WEP/WPA weaknesses, rogue APs, etc.) and mobile platform security (device encryption, app security). The goal is to teach how to harden these ubiquitous but vulnerable technologies.

    • Micro-Topic 28.1: Wi-Fi Security Basics – From WEP to WPA3

      ·       Learning Goal: Understand the evolution of Wi-Fi security protocols (WEP, WPA, WPA2, WPA3), their weaknesses, and current best practices for securing a wireless network.

    • Micro-Topic 28.2: Common Wi-Fi Attacks – Eavesdropping, Evil Twins, and More

      ·       Learning Goal: Identify common attacks on wireless networks (sniffing, unauthorized APs, deauthentication attacks, evil twin/honeypot APs) and how to defend against them (encryption, user training, network monitoring).

    • Micro-Topic 28.3: Mobile Device Threats – Malware, Theft, and Insecure Apps

      ·       Learning Goal: Outline the main threats targeting mobile devices: malware (malicious apps), device theft leading to data compromise, and insecure or malicious apps (leaky data, excessive permissions). Discuss how to mitigate these (app sources, updates, encryption, mobile management).

    • Micro-Topic 28.4: Securing Mobile Devices – Updates, Encryption, and Policies

      ·       Learning Goal: Provide a checklist of best practices to harden mobile devices: enabling full disk encryption, keeping OS/apps updated, using strong authentication (PIN/biometric), and understanding mobile security features (like Find My, two-factor on device, etc.).