<s>
A	O
rogue	B-Device
access	I-Device
point	I-Device
is	O
a	O
wireless	B-Device
access	I-Device
point	I-Device
that	O
has	O
been	O
installed	O
on	O
a	O
secure	O
network	O
without	O
explicit	O
authorization	O
from	O
a	O
local	B-General_Concept
network	I-General_Concept
administrator	O
,	O
whether	O
added	O
by	O
a	O
well-meaning	O
employee	O
or	O
by	O
a	O
malicious	O
attacker	O
.	O
</s>
<s>
Although	O
it	O
is	O
technically	O
easy	O
for	O
a	O
well-meaning	O
employee	O
to	O
install	O
a	O
"	O
soft	O
access	O
point	O
"	O
or	O
an	O
inexpensive	O
wireless	B-Device
router	I-Device
—	O
perhaps	O
to	O
make	O
access	O
from	O
mobile	O
devices	O
easier	O
—	O
it	O
is	O
likely	O
that	O
they	O
will	O
configure	O
this	O
as	O
"	O
open	O
"	O
,	O
or	O
with	O
poor	O
security	O
,	O
and	O
potentially	O
allow	O
access	O
to	O
unauthorized	O
parties	O
.	O
</s>
<s>
To	O
prevent	O
the	O
installation	O
of	O
rogue	B-Device
access	I-Device
points	I-Device
,	O
organizations	O
can	O
install	O
wireless	O
intrusion	O
prevention	O
systems	O
to	O
monitor	O
the	O
radio	B-Algorithm
spectrum	I-Algorithm
for	O
unauthorized	O
access	O
points	O
.	O
</s>
<s>
Presence	O
of	O
a	O
large	O
number	O
of	O
wireless	B-Device
access	I-Device
points	I-Device
can	O
be	O
sensed	O
in	O
airspace	O
of	O
a	O
typical	O
enterprise	O
facility	O
.	O
</s>
<s>
A	O
wireless	O
intrusion	O
prevention	O
system	O
facilitates	O
the	O
job	O
of	O
auditing	O
these	O
access	O
points	O
on	O
a	O
continuous	O
basis	O
to	O
learn	O
whether	O
there	O
are	O
any	O
rogue	B-Device
access	I-Device
points	I-Device
among	O
them	O
.	O
</s>
<s>
In	O
order	O
to	O
detect	O
rogue	B-Device
access	I-Device
points	I-Device
,	O
two	O
conditions	O
need	O
to	O
be	O
tested	O
:	O
</s>
<s>
If	O
an	O
unauthorized	O
access	O
point	O
is	O
found	O
connected	O
to	O
the	O
secure	O
network	O
,	O
it	O
is	O
the	O
rogue	B-Device
access	I-Device
point	I-Device
of	O
the	O
first	O
kind	O
(	O
also	O
called	O
as	O
“	O
wired	O
rogue	O
”	O
)	O
.	O
</s>
<s>
Among	O
the	O
external	O
access	O
points	O
,	O
if	O
any	O
is	O
found	O
to	O
be	O
mischievous	O
or	O
a	O
potential	O
risk	O
(	O
e.g.	O
,	O
whose	O
settings	O
can	O
attract	O
or	O
have	O
already	O
attracted	O
secure	O
network	O
wireless	O
clients	O
)	O
,	O
it	O
is	O
tagged	O
as	O
a	O
rogue	B-Device
access	I-Device
point	I-Device
of	O
the	O
second	O
kind	O
,	O
which	O
is	O
often	O
called	O
an	O
"	O
evil	B-Protocol
twin	I-Protocol
"	O
.	O
</s>
<s>
This	O
makes	O
it	O
possible	O
,	O
without	O
the	O
need	O
of	O
a	O
physical	O
Wi-Fi	B-Device
router	I-Device
,	O
to	O
share	O
the	O
wired	O
network	O
access	O
of	O
one	O
computer	O
with	O
wireless	O
clients	O
connected	O
to	O
that	O
soft	O
AP	O
.	O
</s>
