3) Attacker’s internal rogue access point: The rogue
access point is setup inside the company and does
connect to the company’s network. The attacker
will use this rogue access point as the backdoor to
access the network at later time.This rogue access
point is unlikely because the attacker has to bypass
the physical security and access to the internal
LAN. But once it is successful, it would be a
serious security breach. Typically the attacker will
disable the broadcast SSID in order to hide it from
others to notice.