ISBN-13: 9786205495247 / Angielski / Miękka / 80 str.
An attacker who has gained access to data pathways in your network is able to "listen in" or interpret (read) the traffic since the vast majority of network communications take place in an insecure or "clear text" format. This makes it possible for an attacker to read the traffic. Snooping and sniffing are both terms that are used to describe when an adversary is monitoring your communications in order to gain information. The ability of a snoop to keep tabs on the network is typically the most significant threat to data security that network managers in an organization must contend with. It is possible for other people to access your data as it travels via the network if you do not use robust encryption services that are founded on cryptography.