1.4.6

Information Security

Test yourself

Data Interception

Data interception is an increasing threat to the security of organisations.

Illustrative background for Data as a commodityIllustrative background for Data as a commodity ?? "content

Data as a commodity

  • Data is a very valuable commodity.
  • Personal data can be used to impersonate individuals to gain access to their assets.
  • Outsiders can exploit the financial data or trade secrets of organisations to gain a competitive advantage.
Illustrative background for Data theftIllustrative background for Data theft ?? "content

Data theft

  • Data theft is a serious concern for any organisation.
  • The loss of customers' personal data can result in significant fines.
  • Data theft can happen as part of different methods such as:
    • Insider attacks.
    • Man-in-the-middle attacks.
    • Packet sniffing.
Illustrative background for Protection from data theftIllustrative background for Protection from data theft ?? "content

Protection from data theft

  • Data interception and theft is best prevented by employing a range of preventative measures such as:
    • Encrypting data.
    • User access levels.
    • Network policies.
    • Educating users.

Methods of Data Interception

There are three main methods of data interception: insider attacks, man-in-the-middle attacks, and packet sniffing.

Illustrative background for Insider attacksIllustrative background for Insider attacks ?? "content

Insider attacks

  • An insider attack is where someone with privileged access to information (e.g. an employee) uses their access to steal information from the company, and gives it to others.
  • Attackers often have financial or ethical motivations.
  • The risk of insider attacks can be reduced using:
    • Firewalls.
    • User access levels.
Illustrative background for Man-in-the-middle attacksIllustrative background for Man-in-the-middle attacks ?? "content

Man-in-the-middle attacks

  • A man-in-the-middle (MITM) attack is where an attacker will intercept a device's connection to the Internet.
  • This is often done by tricking users into signing into a fake WiFi hotspot.
  • The man-in-the-middle can then see all of the victim's traffic, such as personal information.
  • This is one of the reasons why users should be very careful if they join a public WiFi network.
Illustrative background for Packet sniffingIllustrative background for Packet sniffing ?? "content

Packet sniffing

  • Packet sniffing is where a hacker will intercept data as it is being transmitted across a network.
  • Sniffing software reads and displays the content of all packets being sent on a network.
  • Packet sniffing is a form of passive attack.
  • One of the best ways to protect against packet sniffing is to use encryption so that packets cannot be decoded.

Jump to other topics

1Computer Systems

1.1Systems Architecture

1.2Memory & Storage

1.3Computer Networks, Connections & Protocols

1.4Network Security

1.5Systems Software

1.6Ethical, Legal, Cultural & Environmental Concern

2Computational Thinking, Algorithms and Programming

Go student ad image

Unlock your full potential with GoStudent tutoring

  • Affordable 1:1 tutoring from the comfort of your home

  • Tutors are matched to your specific learning needs

  • 30+ school subjects covered

Book a free trial lesson