This preview shows page 1. Sign up to view the full content.
Unformatted text preview: ontain information, comparable to how wireless technologies work. These waves can be carried over a distance, depending on the
strength of the signals and the material and objects in the surrounding area. Attackers
have used devices to capture these waves and port them to their own computer systems
so they can access information not intended for them.
Attackers need to have specialized tools that tune into the frequency these waves are
carried over. They also have to be within close proximity to the building that is emitting
the waves. Companies that have information of such sensitive nature that attackers
would go through this much trouble usually have special computer systems with shielding that permit only a small amount of electrical signals to be emitted. The companies
can also use material within the walls of the building to stop these types of electrical
waves from passing through them.
These types of attacks are usually the stuff of spy novels, with three guys in a service
van full of high-grade technological devices in the parking lot of a company. However, a
certain technology has caused this type of eavesdropping to happen without such spylike activities: wireless networks. When a company installs a wireless network, certain
configurations can be set to prevent outsiders from being able to eavesdrop on its employees’ network traffic. Unfortunately, some companies do not employ these configurations for one reason or another. This enables anyone with a laptop and a wireless network ch10.indd
ch10.indd 905 12/4/2009 11:39:13 AM All-in-1 / CISSP All-in-One Exam Guide, 5th Ed. / Harris / 160217-8 CISSP All-in-One Exam Guide 906
interface card (NIC) to drive into a company’s parking lot and eavesdrop on network
traffic. (Wireless technology and its security ramifications are covered in Chapter 7.) Wiretapping
Most communications signals are vulnerable to some type of wiretapping or eavesdropping. It can usually be done undetected and is referred to as a passive attack. Tools
used to intercept communications inclu...
View Full Document
This note was uploaded on 06/01/2013 for the course NET 125 taught by Professor Hurst during the Fall '12 term at Wake Tech.
- Fall '12