allo. In doing so, the user inadvertently bypasses the inherent physical endpoint security of the wired network, possibly subverting careful access control policies like WPA2 for easily spoofed MAC filtering [5, 6].
The rogue, or unauthorized, wireless access point (RWAP) now
presents significant security threats