A wireless access point installed by employees in an office or data center environment as a convenience to connectivity without the consent or the knowledge of the network manager.
Assume that any device that connects to a rogue access point as a potential intrusion because it is bypassing the authorized security procedures put in place by the IT department.
A wireless access point, sometimes called an Evil Twin, installed by a cyber adversary in or near an office or data center environment designed to bypass security controls, gain access, and/or surveil the network traffic of the victim’s network.