Important Notice: Our web hosting provider recently started charging us for additional visits, which was unexpected. In response, we're seeking donations. Depending on the situation, we may explore different monetization options for our Community and Expert Contributors. It's crucial to provide more returns for their expertise and offer more Expert Validated Answers or AI Validated Answers. Learn more about our hosting issue here.

What is Eavesdrop Prevention?

eavesdrop prevention
0
Posted

What is Eavesdrop Prevention?

0

One type of security violation is called “eavesdropping.” Normally, a node on a network (Ethernet, Fast Ethernet, Token Ring, FDDI) ignores packets that are not addressed to it. Eavesdropping occurs when a node goes into mode where it receives all packets. This is usually called promiscuous mode and sometimes monitor mode. Often this is a good thing: bridges, routers, and network analyzers must operate in promiscuous mode to do their jobs. However, on a secure network you don’t want just anybody to eavesdrop on the network. The most common ways eavesdropping is exploited is by password capture programs. These programs watch for packets on a network containing passwords–when it sees them, it records them. These passwords can then be used to completely compromise the security on an organization’s servers. Don’t think that these programs are hard to write or hard to find. They are easy to write, easy to find, and come in many different flavors. Believe it or not, many PC network systems

Related Questions

What is your question?

*Sadly, we had to bring back ads too. Hopefully more targeted.

Experts123