From the course: CISSP Cert Prep (2021): 3 Security Architecture and Engineering

Unlock the full course today

Join today to access over 22,500 courses taught by industry experts or purchase this course individually.

Eavesdropping attacks

Eavesdropping attacks

From the course: CISSP Cert Prep (2021): 3 Security Architecture and Engineering

Start my 1-month free trial

Eavesdropping attacks

- [Instructor] If an attacker is able to gain physical or logical access to a network, they may be able to eavesdrop on communications between two systems on that network. These attacks can be especially dangerous if the attacker is able to decrypt encrypted communications and view confidential information without the sender's knowledge or consent. All eavesdropping attacks requires some compromise of the communication path between a client and a server. This might include tapping into a network device or cable or conducting a DNS or ARP poisoning attack to trick a system into sending traffic directly to the attacker instead of the intended recipient. In a moment, we'll take a look at a few different types of eavesdropping attacks, but before we do that, here's just a quick reminder of how web communications take place. A user running a web browser initiates a connection to a server located somewhere off in a data center, but…

Contents