DISCLAIMER

This weblog is created for the purposes of an MBA project for the subject BYL 7134, Cyberlaw. The materials posted on this weblog are for the purposes of the assignment as well as study and non-profit research. Appropriate acknowledgments to the materials that do not belong to the weblog owner have been publicly made. If you are the author or a copyright owner of any of the articles posted in this weblog and you object to such posting on any grounds, including copyright infringement, please contact me and I will take your material down. I state herein that I am relying on the doctrine of fair use. Thank you for supporting my blog.

Saturday, April 24, 2010

The problems associated with Internet Eavesdropping are many and must be stopped

General intrusions and disruptions of all manner and form are pretty much a well an accepted fact of life.

The exponential growth of shared and publically accessible wireless networks such as Wi-Fi networks, wireless WANs, wireless LANs along with the numerous other types of wireless computer networks have markedly increased the risk potential and likelihood of eavesdropping on Internet communications.

Wireless LANs for example include both an organization’s internally accessible wireless network segments which may become accessible only after passing the relevant user authentication processes as well as an organization’s locally accessible internal anonymous and general public accessible segments.

With or without specialty security technologies these networks/systems are still exposed to a multitude of attack scenarios. Man-in-the-Middle attacks are but one of the many ways by which an attacker can ply their trade. Because they are so simple to instigate Man-in-the-Middle attacks tend to be quite prevalent on the Internet more or less perpetually.

Man-in-the-Middle Attacks

Man-in-the-Middle Attacks occur when an attacker tricks a computer user into believing that the user has established a secure link with a target site, such as a bank. In actuality, the computer user is communicating with the attacker's computer, which can eavesdrop as it relays communications between the user and the target site.

For example: A user who thinks he is linked to an airport or coffee shop "hot spot," might actually be linked to a laptop of someone just a few seats away. Most users are totally oblivious to the fact that they have been attacked.


1 comment:

  1. Because technologies in electronic devices are improved very fast people can not imagine the ways that would be attacked, so they must prevent as they can from beginning of their process, for example,connect to the internet that they sure it is secure and don't connect anywhere that they want. Man-in-the-middle attack is one of the simple way for attacking.

    ReplyDelete