Powered By Blogger

Friday, 2 March 2012

HOW DOES WIRETAPPING INTRUDERS POSE A THREAT TO INFORMATION SYSTEM?



A LARGE PORTION OF THE INFORMATION PROCESSED BY THE COMPANY'S COMPUTERS TRAVELS OVER WIRES AND CABLES ARE CALLED WIRETAPPER. SOME INFORMATION IS TRANSMITTED ONLY FROM ONE ROOM TO THE NEXT, AND OTHER INFORMATION MAY BE TRANSMITTED ACROSS THE COUNTRY VIA THE INTERNET. THESE LINES ARE VULNERABLE TO WIRE TAPPING, WHICH MAY BE DONE WITH EVEN INEXPENSIVE DEVICES THAT ARE CAPABLE OF PERFORMING THE TASK WITHOUT GIVING ANY CLUES THAT THE WIRE IS BEING TAPPED.  For example, a simple induction loop coiled around a terminal wire can pick up most voice and RS232 communications. More complex types of eavesdropping can be set up as well. Communications Security, it's important to physically secure all network cabling to protect it both from interception and from vandalism.

No comments:

Post a Comment