Premium Essay

Case Project 1-4: Wireless Sniffing

In:

Submitted By walnut65
Words 307
Pages 2
Case Project 1-4: Wireless Sniffing

In my opinion, Packet Sniffer programs are great if used for the right reason. I don’t agree with the way hackers use the tool; however, I do agree with the way it can be used to intercept data as it is transmitted over a network and decode the data into a format that is readable. I believe people or companies that utilize Packet Sniffers programs should be closely monitored by a regulatory committee. Packet Sniffer programs are being used by the public and private companies to view the contents of packets of information being sent over the Internet within that network. Despite the way the program is being used now by hackers, it was originally intended as a means of managing the network to safeguard Internet users from malicious programs being sent over the Internet, by intercepting them before they reached the end-users. While this remains to be one of the main functions of Packet Sniffer programs, the technology has also been utilized as a network management tool, as well as, by the government for surveillance, targeting advertising, and dealing with copyright infringements. As mentioned above, Packet Sniffer programs were originally developed to secure local area networks, which are used to cover small geographical areas, such as a company or university in order to ensure there is no unwanted traffic coming in from outside the network. In the past, this task used to be accomplished by firewalls, but due to developments in web applications, the boundaries between the internal LAN and the external Internet is not so well-defined. Network administrators must now fully inspect the data coming in and out of the LAN to ensure that their network traffic is safe for malicious acts. The best way to accomplish this task is by using a Packet Sniffer

Similar Documents

Free Essay

Ethical Thinking

...ethical for Google to collect payload data using its Street View vehicles through unencrypted Wi-Fi network. Google's street view project was intended to capture images and also Wi-Fi data which are then used to map businesses and landmarks. However Google was found to be collecting 'payload' data which was unnecessary for its location database project. Numerous investigations ensued, questioning the ethicality of the Street View debacle. Theoretical Perspectives This section will look at 3 schools of ethical theories. From a virtue ethics point of view, though Google's s slogan "Don't Be Evil" and its Google Code of Conduct established a baseline for honest decision-making, it is more action-based rather than character based. Being an Internet service provider that handles an immense amount of data, Google should aspire to be an organisation that is honest and truthful. Therefore a virtue ethicist will say that Google's data sniffing debacle is unethical since it is against what a virtuous organisation ought to do. Consequentialist theories can be classified based on the type of consequences, the primary beneficiary of the action and if it is agent-centered or agent neutral (Frost). Using the theory of ethical egoism, the consequences for the agent are taken to matter more than any other result. In the design document of the Street View Project, it was stated that Wi-Fi data Google gathered would "be analyzed offline for use in other initiatives." (Federal Communications...

Words: 1537 - Pages: 7

Free Essay

Packet Sniffer Report

...IMPLEMENTATION OF PACKET SNIFFING IN JAVA USING JPCAP LIBRARY Project Report Submitted in Partial Fulfillment of the Requirement for the Award of Degree of Bachelor of Engineering in Computer Science Engineering of Rajiv Gandhi Proudyogiki Vishwavidalaya, Bhopal (MP) By Siddharth Pateriya Swarna Swaminathan (0131CS081077) (0131CS081084) Department of Computer Science Engineering Jai Narain College of Technology, Bhopal June – 2012 DECLARATION We, Siddharth Pateriya and Swarna Swaminathan, the students of Bachelor of Engineering (Computer Science Engineering), Jai Narain College of Technology, Bhopal hereby declare that the work presented in this Major Project is an authentic record of our own and has been carried out taking care of Engineering Ethics under the guidance of Prof. Manish Mishra. Siddharth Pateriya Swarna Swaminathan (0131CS081077) (0131CS081084) CERTIFICATE This is to certify that the work embodied in this Major Project entitled “Implementation of Packet Sniffing in Java using Jpcap Library” has been satisfactorily completed by the students of final year, Mr. Siddharth Pateriya and Ms.Swarna Swaminathan. The work was carried out satisfactorily under the supervision and guidance of the undersigned in the Department of Computer Science Engineering, Jai Narain College of Technology and Science, Bhopal for the partial...

Words: 8200 - Pages: 33

Premium Essay

Netw 589 Entire Course Wireless Communication Ended Feb-2015 Keller

...NETW 589 Entire Course Wireless Communication Ended Feb-2015 Keller Click Link Below To Buy: http://hwcampus.com/shop/netw-589-entire-course-wireless-communication-ended-feb-2015-keller/ Or Visit www.hwcampus.com NETW 589 Entire Course Wireless Communication Ended Feb-2015 Keller NETW 589 Case Study Wireless Communication Week 5 Keller 12 Power Point Slides Plus Speaker Notes Case Description The organization you work for has leased a building next door to the existing building. The local area networks in the new building and the existing building must be linked to each other. The distance is 657 feet. Here is the relationship of the two buildings. Notice that the blue dashed line showing the route of the link crosses a parking lot not under your control. It also crosses a public street. Both buildings are two stories tall. From the second floor or the roof of each building there is a clear line of sight above the expected height of any vegetation currently in the area. You have been assigned the task of determining the available wireless methods that could be used to connect the buildings to each other and presenting these options to the executive team. The executive team consists of the CEO, the CFO, and the managers of the five business units. They will need to know the following about each option in terms that nontechnical staff can readily understand:  The way the method transmits data back and forth  The advantages of the method  The disadvantages...

Words: 2200 - Pages: 9

Premium Essay

Netw 589 Entire Course Wireless Communication Ended Feb-2015 Keller

...NETW 589 Entire Course Wireless Communication Ended Feb-2015 Keller Click Link Below To Buy: http://hwcampus.com/shop/netw-589-entire-course-wireless-communication-ended-feb-2015-keller/ Or Visit www.hwcampus.com NETW 589 Entire Course Wireless Communication Ended Feb-2015 Keller NETW 589 Case Study Wireless Communication Week 5 Keller 12 Power Point Slides Plus Speaker Notes Case Description The organization you work for has leased a building next door to the existing building. The local area networks in the new building and the existing building must be linked to each other. The distance is 657 feet. Here is the relationship of the two buildings. Notice that the blue dashed line showing the route of the link crosses a parking lot not under your control. It also crosses a public street. Both buildings are two stories tall. From the second floor or the roof of each building there is a clear line of sight above the expected height of any vegetation currently in the area. You have been assigned the task of determining the available wireless methods that could be used to connect the buildings to each other and presenting these options to the executive team. The executive team consists of the CEO, the CFO, and the managers of the five business units. They will need to know the following about each option in terms that nontechnical staff can readily understand:  The way the method transmits data back and forth  The advantages of the method  The disadvantages...

Words: 2200 - Pages: 9

Premium Essay

Netw 589 Entire Course Wireless Communication Ended Feb-2015 Keller

...NETW 589 Entire Course Wireless Communication Ended Feb-2015 Keller Click Link Below To Buy: http://hwcampus.com/shop/netw-589-entire-course-wireless-communication-ended-feb-2015-keller/ Or Visit www.hwcampus.com NETW 589 Entire Course Wireless Communication Ended Feb-2015 Keller NETW 589 Case Study Wireless Communication Week 5 Keller 12 Power Point Slides Plus Speaker Notes Case Description The organization you work for has leased a building next door to the existing building. The local area networks in the new building and the existing building must be linked to each other. The distance is 657 feet. Here is the relationship of the two buildings. Notice that the blue dashed line showing the route of the link crosses a parking lot not under your control. It also crosses a public street. Both buildings are two stories tall. From the second floor or the roof of each building there is a clear line of sight above the expected height of any vegetation currently in the area. You have been assigned the task of determining the available wireless methods that could be used to connect the buildings to each other and presenting these options to the executive team. The executive team consists of the CEO, the CFO, and the managers of the five business units. They will need to know the following about each option in terms that nontechnical staff can readily understand:  The way the method transmits data back and forth  The advantages of the method  The disadvantages...

Words: 2200 - Pages: 9

Premium Essay

Netw 589 Entire Course Wireless Communication Ended Feb-2015 Keller

...NETW 589 Entire Course Wireless Communication Ended Feb-2015 Keller Click Link Below To Buy: http://hwcampus.com/shop/netw-589-entire-course-wireless-communication-ended-feb-2015-keller/ Or Visit www.hwcampus.com NETW 589 Entire Course Wireless Communication Ended Feb-2015 Keller NETW 589 Case Study Wireless Communication Week 5 Keller 12 Power Point Slides Plus Speaker Notes Case Description The organization you work for has leased a building next door to the existing building. The local area networks in the new building and the existing building must be linked to each other. The distance is 657 feet. Here is the relationship of the two buildings. Notice that the blue dashed line showing the route of the link crosses a parking lot not under your control. It also crosses a public street. Both buildings are two stories tall. From the second floor or the roof of each building there is a clear line of sight above the expected height of any vegetation currently in the area. You have been assigned the task of determining the available wireless methods that could be used to connect the buildings to each other and presenting these options to the executive team. The executive team consists of the CEO, the CFO, and the managers of the five business units. They will need to know the following about each option in terms that nontechnical staff can readily understand:  The way the method transmits data back and forth  The advantages of the method  The disadvantages...

Words: 2200 - Pages: 9

Premium Essay

Assdt

...Exam Name___________________________________ TRUE/FALSE. Write 'T' if the statement is true and 'F' if the statement is false. 1) Wireless networks are vulnerable to penetration because radio frequency bands are easy to scan. 1) _______ 2) Viruses can be spread through e-mail. 2) _______ 3) Public key encryption uses two keys. 3) _______ 4) Packet filtering catches most types of network attacks. 4) _______ 5) Biometric authentication is the use of physical characteristics such as retinal images to provide identification. 5) _______ 6) Enterprise systems use a client/server architecture and have not yet been redesigned to take advantage of the Web. 6) _______ 7) Low inventory acts a buffer for the lack of flexibility in the supply chain. 7) _______ 8) Total supply chain costs represent the majority of operating expenses for many businesses and in some industries approach 75 percent of the total operating budget. 8) _______ 9) All CRM packages contain modules for PRM and ERM. 9) _______ 10) Enterprise systems require fundamental changes in the way the business operates. 10) ______ 11) The Internet shrinks information asymmetry. 11) ______ 12) In general, for digital goods, the marginal cost of producing another unit is about zero. 12)...

Words: 1895 - Pages: 8

Free Essay

Ntc 362 Individual Final Assignment

...locations are in Del Mar and Encinitas. They have an OC 1 SONET using a T3 dedicated line connecting all three stores. This requires a fiber optic physical connection between stores since a T3 is equivalent to 28 T1 lines. This dedicated network is leased from the ISP and is guaranteed a continuous uninterrupted connection. This type of connection allows for a total of about 44736 Kbps and has 672 channels. KFF is using a 25Mbps connection to the internet. All three KFF locations are using a linear bus topology using 100base T Ethernet, which means that Ethernet is used and allows for data transfer rates of up to 100Mbps. The file server, workstations and all equipment previously mentioned are connected to a linear cable. This type of LAN network has disadvantages that outweigh the advantages. One major disadvantage is that the entire network is disabled if there is a break in the main cable, and locating the break can prove to be difficult. Another disadvantage is that the more devices are added, the less efficient it becomes. This outdated design broadcasts data which uses up important bandwidth that can be used for better purposes. The conversion from this topology to a WLAN will benefit KFF on several levels. The addition of wireless technology is a cost-friendly alternative for KFF. It will be less vulnerable to complete outages due to line breaks. If there is a network issue, it will be much easier to isolate. In some cases, issues can even be resolved remotely without ever...

Words: 1984 - Pages: 8

Premium Essay

It World

...Global Information Assurance Certification Paper Copyright SANS Institute Author Retains Full Rights This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without express written permission. Interested in learning more? Check out the list of upcoming events offering "Security Essentials Bootcamp Style (Security 401)" at http://www.giac.org/registration/gsec Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 © SA NS In sti tu te © SANS Institute 2004, As part of GIAC practical repository. 20 04 Valdo Araiza 3/30/2004 ,A GIAC Security Essentials Certification (GSEC) Practical Assignment Version 1.4b ut ho rr Technological Advances and the Effect on Physical Security eta ins fu ll r igh ts. Author retains full rights. Abstract The strides in technology each year have surpassed the previous year by leaps and bounds and will probably continue to do so in the future. Information technology continues to advance in ways that greatly benefit society on many levels but as the increasing benefits develop so do the security vulnerabilities associated with information technology. Hardware and software is being released to the general public that can help people be more productive but this same technology can be used to infiltrate or impede practiced physical security measures whether that effort is intentional or not. In this paper we will explore both...

Words: 5538 - Pages: 23

Free Essay

Researh Paper

...originalarbeiten Elektrotechnik & Informationstechnik (2006) 123/7/8: 288–296. DOI 10.1007/s00502-006-0362-y Traffic monitoring and analysis in 3G networks: lessons learned from the METAWIN project F. Ricciato, P. Svoboda, J. Motz, W. Fleischer, M. Sedlak, M. Karner, R. Pilz, P. Romirer-Maierhofer, E. Hasenleithner, W. Jager, P. Kruger, F. Vacirca, M. Rupp ¨ ¨ A 3G network is a magnificently complex object embedded in a highly heterogeneous and ever-changing usage environment. It combines the functional complexity of the wireless cellular paradigm with the protocol dynamics of TCP=IP networks. Understanding such an environment is more urgent and at the same time more difficult than for legacy 2G networks. Continuous traffic monitoring by means of an advanced system, coupled with routine expert-driven traffic analysis, provides an in-depth understanding of the status and performances of the network as well as of the statistical behaviour of the user population. Such knowledge allows for a better engineering and operation practice of the whole network, and specifically the early detection of hidden risks and emerging troubles. Furthermore, the exploitation of certain TCP=IP dynamic behaviour, particularly the TCP control-loop, coupled with information extracted from the 3GPP layers, provides a cost-effective means to monitor the status of the whole network without requiring access to all network elements. In this article the main lessons are summarized learned from a two-year...

Words: 7609 - Pages: 31

Premium Essay

Test

...2014 1 SECURING WI-FI ROGUE ACESS WITHIN AN ENTERPRISE SETTING 2 A1 - Abstract Since 1999 wireless devices have become a necessity in enterprises. While increasing convenience, connectivity, and productivity, they also pose an unprecedented threat to network security guarding, which has literally taken to the airwaves. This paper will deal with vulnerabilities and risks regarding access points (APs) in a wireless network (WLAN) connecting to a wired local area network (LAN) in enterprises. Data for this paper will come from published academic papers, industry publications including white papers and surveys, and industry specialists. It will also include definitions of terms, policy and procedures that affect access points, and current practices regarding rogue APs. A case study will be presented for a fictional enterprise with multiple locations that has standard procedures, policies, and protocols in place, but recent events have questioned their ability to control access points with the discovery of rogue devices hidden in several office locations. Industry warnings about access points span the past thirteen years, and still new articles appear saying similar warnings, with only the solutions evolving with the technology. Suggested solutions will include security literacy regarding APs and their devices and their compliance; security audits to re-evaluate configurations of current hardware and software, inventory of current APs, wireless devices...

Words: 18577 - Pages: 75

Free Essay

With the Development of Technology, More and More Robots Are Used in Various Fields,

...of Instruction and Evaluation Third Year -Semester VI Scheme of Instructions Sr. Subjects Lect/ No 1 Information and Network Security Middleware and Enterprise Integration Technologies Software Engineering Data Base Technologies Programming for Mobile and Remote Computers Information Technology for Management of Enterprise TOTAL Week 4 Scheme of Examinations Theory T/W Practical Oral Total Hours Marks Marks Marks Marks Marks 3 100 25 -25 150 Pract/ Week 2 Tut/ Week -- 2 4 2 -- 3 100 25 -- 25 150 3 4 5 4 4 4 2 2 2 ---- 3 3 3 100 100 100 25 25 25 --25 25 25 -- 150 150 150 6 4 24 10 1 1 3 -- 100 600 25 150 -25 25 125 150 900 INFORMATION AND NETWORK SECURITY CLASS T.E. ( INFORMATION TECHNOLOGY) HOURS PER LECTURES : WEEK TUTORIALS : PRACTICALS EVALUATION SYSTEM: THEORY PRACTICAL ORAL TERM WORK : SEMESTER VI 04 -02 HOURS 3 ---- MARKS 100 25 25 1. Introduction What is Information Security? Security Goals. 2. Cryptography Crypto Basic, Classic Cryptography, Symmetric Key Cryptography: Stream Ciphers, A5/1, RC4, Block Ciphers, Feistel Cipher, DES, Triple DES, AES, Public Key Cryptography: Kanpsack, RSA, Defiie-Hellman, use of public key crypto- Signature and Non-repudiation, Confidentiality and Non-repudiation, Public Key Infrastructure, Hash Function: The Birthday Problem, MD5, SHA-1, Tiger Hash, Use of Hash Function. 3. Access control - Authentication and Authorization Authentication...

Words: 3868 - Pages: 16

Premium Essay

Computer Security Management

...CSE 4482 Computer Security Management: Assessment and Forensics Introduction to Information Security Instructor: N. Vlajic, Fall 2010 Learning Objectives Upon completion of this material, you should be able to: • Define key terms and critical concepts of information security. List the key challenges of information security, and key protection layers. Describe the CNSS security model (McCumber Cube). Be able to differentiate between threats and attacks to information. Identify today’s most common threats and attacks against information. • • • • Introduction “In the last 20 years, technology has permeated every facet of the business environment. The business place is no longer static – it moves whenever employees travel from office to office, from office to home, from city to city. Since business have become more fluid, …, information security is no longer the sole responsibility of a small dedicated group of professionals, …, it is now the responsibility of every employee, especially managers.” http://www.businessandleadership.com/fs/img/news/200811/378x/business-traveller.jpg http://www.businessandleadership.com/fs/img/news/200811/378x/businesshttp://www.koolringtones.co.uk/wp-content/uploads/2010/01/mobile-phones.jpg http://www.koolringtones.co.uk/wp- content/uploads/2010/01/mobile- Information Technology • Information Technology – enables storage and transportation of information from one business unit to another in many organizations...

Words: 4051 - Pages: 17

Premium Essay

Blackjacking Security

...Blackjacking Security Threats to BlackBerry® Devices, PDAs, and Cell Phones in the Enterprise Daniel Hoffman Wiley Publishing, Inc. Blackjacking Blackjacking Security Threats to BlackBerry® Devices, PDAs, and Cell Phones in the Enterprise Daniel Hoffman Wiley Publishing, Inc. Blackjacking: Security Threats to BlackBerrys, PDAs, and Cell Phones in the Enterprise Published by Wiley Publishing, Inc. 10475 Crosspoint Boulevard Indianapolis, IN 46256 www.wiley.com Copyright © 2007 by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada ISBN: 978-0-470-12754-4 Manufactured in the United States of America 10 9 8 7 6 5 4 3 2 1 No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at http://www.wiley.com/go/permissions. Limit of Liability/Disclaimer of Warranty: The publisher and the author make...

Words: 83592 - Pages: 335

Premium Essay

Security Analyst

...Contents 1. Introduction 2. Assessment Test 3. Chapter 1: Getting Started with Ethical Hacking 1. Hacking: A Short History 2. What Is an Ethical Hacker? 3. Summary 4. Exam Essentials 5. Review Questions 4. Chapter 2: System Fundamentals 1. Exploring Network Topologies 2. Working with the Open Systems Interconnection Model 3. Dissecting the TCP/IP Suite 4. IP Subnetting 5. Hexadecimal vs. Binary 6. Exploring TCP/IP Ports 7. Understanding Network Devices 8. Working with MAC Addresses 9. Intrusion Prevention and Intrusion Detection Systems 10. Network Security 11. Knowing Operating Systems 12. Backups and Archiving 13. Summary 14. Exam Essentials 15. Review Questions 5. Chapter 3: Cryptography 2 1. Cryptography: Early Applications and Examples 2. Cryptography in Action 3. Understanding Hashing 4. Issues with Cryptography 5. Applications of Cryptography 6. Summary 7. Exam Essentials 8. Review Questions 6. Chapter 4: Footprinting and Reconnaissance 1. Understanding the Steps of Ethical Hacking 2. What Is Footprinting? 3. Terminology in Footprinting 4. Threats Introduced by Footprinting 5. The Footprinting Process 6. Summary 7. Exam Essentials 8. Review Questions 7. Chapter 5: Scanning Networks 1. What Is Network Scanning? 2. Checking for Live Systems 3. Checking for Open Ports 4. Types of Scans 5. OS Fingerprinting 6. Banner Grabbing 7. Countermeasures 8. Vulnerability Scanning 9. Drawing Network Diagrams 10. Using Proxies 11. Summary 12. Exam Essentials 13. Review Questions...

Words: 71242 - Pages: 285