Show Summary Details

Quick Reference

The act of capturing data which is flowing through the communications media used by a computer network. There are a variety of methods used to eavesdrop ranging from gaining access to a system by pretending to be a system administrator to physically implanting hardware into a system which can monitor traffic down a communication line. The main technology used to counteract eavesdropping is encryption.

Subjects: Computing.

Reference entries

Users without a subscription are not able to see the full content. Please, subscribe or login to access all content.