1.4.10

Methods of Data Interception

Test yourself on Methods of Data Interception

Test your knowledge with free interactive questions on Seneca — used by over 10 million students.

Methods of Data Interception

There are three main methods of data interception: insider attacks, man-in-the-middle attacks, and packet sniffing.

Insider attacks

Insider attacks

  • An insider attack is where someone with privileged access to information (e.g. an employee) uses their access to steal information from the company, and gives it to others.
  • Attackers often have financial or ethical motivations.
  • The risk of insider attacks can be reduced using:
    • Firewalls.
    • User access levels.
Man-in-the-middle attacks

Man-in-the-middle attacks

  • A man-in-the-middle (MITM) attack is where an attacker will intercept a device's connection to the Internet.
  • This is often done by tricking users into signing into a fake WiFi hotspot.
  • The man-in-the-middle can then see all of the victim's traffic, such as personal information.
  • This is one of the reasons why users should be very careful if they join a public WiFi network.
Packet sniffing

Packet sniffing

  • Packet sniffing is where a hacker will intercept data as it is being transmitted across a network.
  • Sniffing software reads and displays the content of all packets being sent on a network.
  • Packet sniffing is a form of passive attack.
  • One of the best ways to protect against packet sniffing is to use encryption so that packets cannot be decoded.
Jump to other topics
1

Computer Systems

1.1

Systems Architecture

1.2

Memory & Storage

1.3

Computer Networks, Connections & Protocols

1.4

Network Security

1.5

Systems Software

1.6

Ethical, Legal, Cultural & Environmental Concern

2

Computational Thinking, Algorithms & Programming

2.1

Algorithms

2.2

Programming Fundamentals

2.3

Producing Robust Programs

2.4

Boolean Logic

2.5

Programming Languages & IDEs

Practice questions on Methods of Data Interception

Can you answer these? Test yourself with free interactive practice on Seneca — used by over 10 million students.

  1. 1
  2. 2
Answer all questions on Methods of Data Interception

Unlock your full potential with Seneca Premium

  • Unlimited access to 10,000+ open-ended exam questions

  • Mini-mock exams based on your study history

  • Unlock 800+ premium courses & e-books

Get started with Seneca Premium