xxiv
Security
Although one of the benefits of this product is that it allows others to freely
connect for the wireless exchange of data anywhere within its range, the
following may occur if security is not enabled:
• Data theft: Malicious third-parties may intercept wireless transmissions to
steal user IDs, passwords, and other personal information.
• Unauthorized access: Unauthorized users may gain access to the network
and alter data or perform other malicious actions.
Note that due to the
design of wireless networks, specialized attacks may allow unauthorized
access even when security is enabled.
• Unsecured networks: Connecting to open networks may result in
unauthorized access. Use secure networks only.