Search Knowledge Base by Keyword
Access Point
What is an Access Point?
In cybersecurity, an Access Point (AP), specifically a wireless AP, is a device that connects wireless devices to a wired network. It acts as a bridge, enabling devices like laptops and smartphones to access the internet or other network resources wirelessly. While often combined with a router in home settings, the AP is a distinct component responsible for wireless signal transmission and reception.
APs in cybersecurity:
- Functionality: To receive data from the wired network, convert it into a radio signal or bluetooth, and transmit it to wireless devices. They also receive signals from devices and convert them back to wired signals.
- Security Risks: Improperly secured APs can be a major vulnerability. Attackers can exploit weak passwords, outdated firmware, or misconfigured settings to gain access to the network.
- Rogue Access Points: Unauthorized APs, also known as rogue APs, pose a significant threat. These can be set up by malicious actors to intercept data or launch further attacks.
- Security Measures: To mitigate risks, it’s crucial to secure access points by using strong passwords, enabling encryption (like WPA2/3), regularly updating firmware, and implementing MAC address filtering.
- Distinction from Routers: While some devices combine access point and router functionalities, it’s important to understand their separate roles. Routers manage network traffic and routing, while access points handle the wireless connection.
Definition
A device that logically connects wireless client devices operating in infrastructure to one another and provides access to a distribution system, if connected, which is typically an organization’s enterprise wired network.
SOURCE: SP 800-48; SP 800-121