However a certain technology has caused this type of

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: ontain information, comparable to how wireless technologies work. These waves can be carried over a distance, depending on the strength of the signals and the material and objects in the surrounding area. Attackers have used devices to capture these waves and port them to their own computer systems so they can access information not intended for them. Attackers need to have specialized tools that tune into the frequency these waves are carried over. They also have to be within close proximity to the building that is emitting the waves. Companies that have information of such sensitive nature that attackers would go through this much trouble usually have special computer systems with shielding that permit only a small amount of electrical signals to be emitted. The companies can also use material within the walls of the building to stop these types of electrical waves from passing through them. These types of attacks are usually the stuff of spy novels, with three guys in a service van full of high-grade technological devices in the parking lot of a company. However, a certain technology has caused this type of eavesdropping to happen without such spylike activities: wireless networks. When a company installs a wireless network, certain configurations can be set to prevent outsiders from being able to eavesdrop on its employees’ network traffic. Unfortunately, some companies do not employ these configurations for one reason or another. This enables anyone with a laptop and a wireless network ch10.indd ch10.indd 905 12/4/2009 11:39:13 AM All-in-1 / CISSP All-in-One Exam Guide, 5th Ed. / Harris / 160217-8 CISSP All-in-One Exam Guide 906 interface card (NIC) to drive into a company’s parking lot and eavesdrop on network traffic. (Wireless technology and its security ramifications are covered in Chapter 7.) Wiretapping Most communications signals are vulnerable to some type of wiretapping or eavesdropping. It can usually be done undetected and is referred to as a passive attack. Tools used to intercept communications inclu...
View Full Document

This note was uploaded on 06/01/2013 for the course NET 125 taught by Professor Hurst during the Fall '12 term at Wake Tech.

Ask a homework question - tutors are online