EXERCISE
(1) Describe the following and explain how it works:
Sniffing/wiretapping/eavesdropping on network traffic:
- Wiretapping is achieved either through the placement of a monitoring device informally kown as a bug on the wire in question or through other communication technologies. Place a device or program to intercept or monitor packets that sent over the network. Sensitive information such as passwords and trade secrets can be captured.
Exploiting security weakness:
- An exploit is the next step in a hacker's playbook after finding a vulnerability, gains access to your own gains to track user's financial information.
Internet Protocol (IP) spoofing:
- It is refer to network hijacking. The hacker's can access the user's information when they use the same network.
Social engineering:
- It is the art of manipulating people so they give up confidential information. This attacker can trick the user's by giving them your passwords or bank information, so that they can access and controlling your computer by installing an software.
REFERENCES:
No comments:
Post a Comment