Quick Reference

The act of capturing data which is flowing through the communications media used by a computer network. There are a variety of methods used to eavesdrop ranging from gaining access to a system by pretending to be a system administrator to physically implanting hardware into a system which can monitor traffic down a communication line. The main technology used to counteract eavesdropping is encryption.

Subjects: Computing.

Reference entries