Just as with WPAv1, WPAv2 may work in cooperation with EAP and a WIDS.
•
Anyone within the geographical network range of an open, unencrypted wireless network can 'sniff' or capture and record the traffic, gain unauthorized access to internal network resources as well as to the internet, and then use the information and resources to perform disruptive or illegal acts.
National Security Agency | National Security Council | Organization for Security and Co-operation in Europe | United States National Security Council | Verizon Wireless | United Nations Security Council | National Security Advisor | United States Department of Homeland Security | security | National Security Advisor (United States) | Social Security Administration | United Nations Security Council resolution | Cable & Wireless plc | wireless | United Nations Security Council Resolution 1267 | Transportation Security Administration | Hacker (computer security) | George C. Marshall European Center for Security Studies | United Nations Security Council Resolution 1373 | Wireless | Transport Layer Security | Social Security | Committee of General Security | United Nations Security Council Resolution | Cable & Wireless Worldwide | Wireless LAN | Social Security (United States) | High Representative of the Union for Foreign Affairs and Security Policy | computer security | National Security Archive |
The only security currently in the Parrot drones prevents a second pilot from taking over, however SkyJack uses Aircrack-ng to perform a "deauthentication attack" against the pilot, exploiting a mechanism in wireless security.