Question

In: Computer Science

With respect to the C.I.A. and A.A.A. concepts, what risks are posed by packet sniffers, which monitor all the packets that are transmitted in a wireless Internet access point?

CIA

Confidentiality - The avoidance of the unauthorized disclosure of information

Integrity - The property that information has not be altered in an unauthorized way

Availability - The property that information is accessible and modifiable in a timely fashion by those authorized to do so

AAA

Assurance - How trust is provided and managed in computer systems

Authenticity - The ability to determine that statements, policies, and permissions issued by persons or systems are genuine.

Anonymity - The property that certain records or transactions not to be attributable to any individual

With respect to the C.I.A. and A.A.A. concepts, what risks are posed by packet sniffers, which monitor all the packets that are transmitted in a wireless Internet access point?

Solutions

Expert Solution

Now a days,computersecurity is the major issue in the world,because there are so many hackers seating everywhere,who are regularly trying to thief the important data from your computer.

In order to keep our data safe,we should alwasys keep a backup of our important file,so that in case our computer gets hacked,or gets virus,we can easily get our important datas .

so with respect to CIA and AAA Concepts,we can face following risks by pcket sniffers in wireless internet access point:

1.confidentiality-they can fetch the confidential file data by intruppting the data flow in between the host and the guest port.

Availability – available in event of physical challenges,

fallbacksAssurance – policies, permissions, protections

Authenticity – digital signatures (nonrepudiation),

Anonymity – mixing, proxies, pseudonyms

EavesdroppingAlternationDenial of service

Masquerading – from alice, really is from

eveRepudiation – denial of data receipt

Correlation and traceback – determine the source.

they can determine the source and can change the source code is the code is public and easily accesible.

-----------------

PACKET SNIFFERS:

IT is a network toolwhic is now a days widey used by the technisions to analyse the data flow in the internet and also analyse the problems in the network.It is usefull both for hackers and programmers,hackers can also use packet sniffer for data mining of the personal information from any computer. it is in both hardware and software form.

sniffer software can be used as the network computer ,Once sniffer software is installed on a machine, that system can be placed on a network just like any other computer. Sniffers typically use off-the-shelf network cards that work in promiscuous mode. Promiscuous mode cards can pick up and process packets that are not addressed to the receiving device. This ‘promiscuity’ enables network sniffers to listening in on other users’ traffic provided that traffic comes down the cable to the sniffer. These sniffers are fantastic for troubleshooting network problems..


Related Solutions

With respect to the C.I.A. and A.A.A. concepts, what risks are posed by spam?
CIAConfidentiality - The avoidance of the unauthorized disclosure of informationIntegrity - The property that information has not be altered in an unauthorized wayAvailability - The property that information is accessible and modifiable in a timely fashion by those authorized to do soAAAAssurance - How trust is provided and managed in computer systemsAuthenticity - The ability to determine that statements, policies, and permissions issued by persons or systems are genuine.Anonymity - The property that certain records or transactions not to be...
With respect to the C.I.A. and A.A.A. concepts, what risks are posed by trojan horses?
CIAConfidentiality - The avoidance of the unauthorized disclosure of informationIntegrity - The property that information has not be altered in an unauthorized wayAvailability - The property that information is accessible and modifiable in a timely fashion by those authorized to do soAAAAssurance - How trust is provided and managed in computer systemsAuthenticity - The ability to determine that statements, policies, and permissions issued by persons or systems are genuine.Anonymity - The property that certain records or transactions not to be...
With respect to the C.I.A. and A.A.A. concepts, what risks are posed by computer viruses?
CIAConfidentiality - The avoidance of the unauthorized disclosure of informationIntegrity - The property that information has not be altered in an unauthorized wayAvailability - The property that information is accessible and modifiable in a timely fashion by those authorized to do soAAAAssurance - How trust is provided and managed in computer systemsAuthenticity - The ability to determine that statements, policies, and permissions issued by persons or systems are genuine.Anonymity - The property that certain records or transactions not to be...
With respect to the C.I.A. and A.A.A. concepts, what risks are posed by someone making so many download requests from an online music store that it prevents other users from being able to download any songs?
CIAConfidentiality - The avoidance of the unauthorized disclosure of informationIntegrity - The property that information has not be altered in an unauthorized wayAvailability - The property that information is accessible and modifiable in a timely fashion by those authorized to do soAAAAssurance - How trust is provided and managed in computer systemsAuthenticity - The ability to determine that statements, policies, and permissions issued by persons or systems are genuine.Anonymity - The property that certain records or transactions not to be...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT