Network eavesdropping

Network eavesdropping, also known as eavesdropping attack, sniffing attack, or snooping attack, is a method that retrieves user information through the internet. This attack happens on electronic devices like computers and smartphones. This network attack typically happens under the usage of unsecured networks, such as public wifi connections or shared electronic devices.[1] Eavesdropping attacks through the network is considered one of the most urgent threats in industries that rely on collecting and storing data.[1] Internet users use eavesdropping via the Internet to improve information security. [2]

A typical network eavesdropper may be called a Black-hat hacker and is considered a low-level hacker as it is simple to network eavesdrop successfully.[1] The threat of network eavesdroppers is a growing concern. Research and discussions are brought up in the public's eye, for instance, types of eavesdropping, open-source tools, and commercial tools to prevent eavesdropping.[3] Models against network eavesdropping attempts are built and developed as privacy is increasingly valued. Sections on cases of successful network eavesdropping attempts and its laws and policies in the National Security Agency are mentioned.[4] Some laws include the Electronic Communications Privacy Act and the Foreign Intelligence Surveillance Act.[4]

  1. ^ a b c Li, Xuran; Wang, Qiu; Dai, Hong-Ning; Wang, Hao (2018-06-14). "A Novel Friendly Jamming Scheme in Industrial Crowdsensing Networks against Eavesdropping Attack". Sensors. 18 (6): 1938. Bibcode:2018Senso..18.1938L. doi:10.3390/s18061938. ISSN 1424-8220. PMC 6022160. PMID 29904003.
  2. ^ Gultom, Rudy Agus Gemilang (2017-12-18). "Internet Eavesdropping: Information Security Challenge in the Cyberspace". Jurnal Pertahanan. 3 (3): 243. doi:10.33172/jp.v3i3.236. ISSN 2549-9459.
  3. ^ Cronin, Eric; Sherr, Micah; Blaze, Matthew (2006), "On the Reliability of Network Eavesdropping Tools", IFIP Advances in Information and Communication Technology, Boston, MA: Springer New York, pp. 199–213, doi:10.1007/0-387-36891-4_16, ISBN 0-387-36891-4
  4. ^ a b "- Wiretapping and Eavesdropping", The Law of Cybercrimes and Their Investigations, Routledge, pp. 266–309, 2011-08-09, doi:10.1201/b13651-13, ISBN 978-0-429-24858-0, retrieved 2020-10-29

© MMXXIII Rich X Search. We shall prevail. All rights reserved. Rich X Search