/*
Customise Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorised as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

Performance cookies are used to understand and analyse the key performance indexes of the website which helps in delivering a better user experience for the visitors.

Advertisement cookies are used to provide visitors with customised advertisements based on the pages you visited previously and to analyse the effectiveness of the ad campaigns.

/*]]>*/

Access Point

June 20, 2025

Access Point

You are here:
< Back

cyber risk assessment insurance cybersecurity best practices define RMM authentication TPRM ecosystem flaw hypothesis methodology high assurance guard 3rd party third-party CISO vulnerability What is an Access Point?

In cybersecurity, an Access Point (AP), specifically a wireless AP, is a device that connects wireless devices to a wired networkIt acts as a bridge, enabling devices like laptops and smartphones to access the internet or other network resources wirelessly. While often combined with a router in home settings, the AP is a distinct component responsible for wireless signal transmission and reception. 

APs in cybersecurity:

  • Functionality: To receive data from the wired network, convert it into a radio signal or bluetooth, and transmit it to wireless devices. They also receive signals from devices and convert them back to wired signals. 
  • Security Risks: Improperly secured APs can be a major vulnerability. Attackers can exploit weak passwords, outdated firmware, or misconfigured settings to gain access to the network. 
  • Rogue Access Points: Unauthorized APs, also known as rogue APs, pose a significant threat. These can be set up by malicious actors to intercept data or launch further attacks. 
  • Security Measures: To mitigate risks, it’s crucial to secure access points by using strong passwords, enabling encryption (like WPA2/3), regularly updating firmware, and implementing MAC address filtering. 
  • Distinction from Routers: While some devices combine access point and router functionalities, it’s important to understand their separate roles. Routers manage network traffic and routing, while access points handle the wireless connection. 

Definition

A device that logically connects wireless client devices operating in infrastructure to one another and provides access to a distribution system, if connected, which is typically an organization’s enterprise wired network.
SOURCE: SP 800-48; SP 800-121

NIST Definition