In: Computer Science
CIA
Confidentiality - The avoidance of the unauthorized disclosure of information
Integrity - The property that information has not be altered in an unauthorized way
Availability - The property that information is accessible and modifiable in a timely fashion by those authorized to do so
AAA
Assurance - How trust is provided and managed in computer systems
Authenticity - The ability to determine that statements, policies, and permissions issued by persons or systems are genuine.
Anonymity - The property that certain records or transactions not to be attributable to any individual
With respect to the C.I.A. and A.A.A. concepts, what risks are posed by packet sniffers, which monitor all the packets that are transmitted in a wireless Internet access point?
Now a days,computersecurity is the major issue in the world,because there are so many hackers seating everywhere,who are regularly trying to thief the important data from your computer.
In order to keep our data safe,we should alwasys keep a backup of our important file,so that in case our computer gets hacked,or gets virus,we can easily get our important datas .
so with respect to CIA and AAA Concepts,we can face following risks by pcket sniffers in wireless internet access point:
1.confidentiality-they can fetch the confidential file data by intruppting the data flow in between the host and the guest port.
Availability – available in event of physical challenges,
fallbacksAssurance – policies, permissions, protections
Authenticity – digital signatures (nonrepudiation),
Anonymity – mixing, proxies, pseudonyms
EavesdroppingAlternationDenial of service
Masquerading – from alice, really is from
eveRepudiation – denial of data receipt
Correlation and traceback – determine the source.
they can determine the source and can change the source code is the code is public and easily accesible.
-----------------
PACKET SNIFFERS:
IT is a network toolwhic is now a days widey used by the technisions to analyse the data flow in the internet and also analyse the problems in the network.It is usefull both for hackers and programmers,hackers can also use packet sniffer for data mining of the personal information from any computer. it is in both hardware and software form.
sniffer software can be used as the network computer ,Once sniffer software is installed on a machine, that system can be placed on a network just like any other computer. Sniffers typically use off-the-shelf network cards that work in promiscuous mode. Promiscuous mode cards can pick up and process packets that are not addressed to the receiving device. This ‘promiscuity’ enables network sniffers to listening in on other users’ traffic provided that traffic comes down the cable to the sniffer. These sniffers are fantastic for troubleshooting network problems..