1.6.6

Information Security

Test yourself

Data Interception

Data interception is an increasing threat to the security of organisations.

Illustrative background for Data as a commodityIllustrative background for Data as a commodity ?? "content

Data as a commodity

  • Data is a very valuable commodity.
  • Personal data can be used to impersonate individuals to gain access to their assets.
  • Outsiders can exploit the financial data or trade secrets of organisations to gain a competitive advantage.
Illustrative background for Data theftIllustrative background for Data theft ?? "content

Data theft

  • Data theft is a serious concern for any organisation.
  • The loss of customers' personal data can result in significant fines.
  • Data theft can happen as part of different methods such as:
    • Insider attacks.
    • Man-in-the-middle attacks.
    • Packet sniffing.
Illustrative background for Protection from data theftIllustrative background for Protection from data theft ?? "content

Protection from data theft

  • Data interception and theft is best prevented by employing a range of preventative measures such as:
    • Encrypting data.
    • User access levels.
    • Network policies.
    • Educating users.

Methods of Data Interception

There are three main methods of data interception: insider attacks, man-in-the-middle attacks, and packet sniffing.

Illustrative background for Insider attacksIllustrative background for Insider attacks ?? "content

Insider attacks

  • An insider attack is where someone with privileged access to information (e.g. an employee) uses their access to steal information from the company, and gives it to others.
  • Attackers often have financial or ethical motivations.
  • The risk of insider attacks can be reduced using:
    • Firewalls.
    • User access levels.
Illustrative background for Man-in-the-middle attacksIllustrative background for Man-in-the-middle attacks ?? "content

Man-in-the-middle attacks

  • A man-in-the-middle (MITM) attack is where an attacker will intercept a device's connection to the Internet.
  • This is often done by tricking users into signing into a fake WiFi hotspot.
  • The man-in-the-middle can then see all of the victim's traffic, such as personal information.
  • This is one of the reasons why users should be very careful if they join a public WiFi network.
Illustrative background for Packet sniffingIllustrative background for Packet sniffing ?? "content

Packet sniffing

  • Packet sniffing is where a hacker will intercept data as it is being transmitted across a network.
  • Sniffing software reads and displays the content of all packets being sent on a network.
  • Packet sniffing is a form of passive attack.
  • One of the best ways to protect against packet sniffing is to use encryption so that packets cannot be decoded.

Jump to other topics

1Computer Systems

1.1Data Representation

1.2Data Transmission

1.3Hardware

1.4Software

1.5The Internet & its Uses

1.6Cyber Security

1.7Automated & Emerging Technologies

2Algorithms, Programming & Logic

Unlock your full potential with Seneca Premium

  • Unlimited access to 10,000+ open-ended exam questions

  • Mini-mock exams based on your study history

  • Unlock 800+ premium courses & e-books

Get started with Seneca Premium