课程: ISC2 Certified Information Systems Security Professional (CISSP) (2024) Cert Prep

免费学习该课程!

今天就开通帐号,24,600 门业界名师课程任您挑!

Eavesdropping attacks

Eavesdropping attacks

- [Instructor] If an attacker is able to gain physical or logical access to a network, they may be able to eavesdrop on communications between two systems on that network. These attacks can be especially dangerous if the attacker is able to decrypt encrypted communications and view confidential information without the sender's knowledge or consent. All eavesdropping attacks require some compromise of the communication path between a client and a server. This might include tapping into a network device or cable, or conducting a DNS or ARP poisoning attack to trick a system into sending traffic directly to the attacker instead of the intended recipient. In a moment, we'll take a look at a few different types of eavesdropping attacks, but before we do that, here's just a quick reminder of how web communications take place. A user running a web browser initiates a connection to a server located somewhere off in a data center. But the reality is that these communications travel over many…

内容