Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Eavesdropping

From Wikipedia, the free encyclopedia
Act of secretly listening to the private conversation of others
"Eavesdrop" redirects here. For water dripping from eaves, seeEavesdrip.

Cardinals eavesdropping in theVatican. A painting byHenri Adolphe Laissement [fr], 1895

Eavesdropping is the act of secretly or stealthily listening to the private conversation or communications of others without their consent in order to gather information.

Etymology

[edit]

The verbeavesdrop is a back-formation from the nouneavesdropper ("a person who eavesdrops"), which was formed from the related nouneavesdrop ("the dripping of water from theeaves of a house; the ground on which such water falls").[1]

An eavesdropper was someone who would hang from theeave of a building so as to hear what is said within. ThePBS documentariesInside the Court of Henry VIII (April 8, 2015)[2] andSecrets of Henry VIII’s Palace (June 30, 2013) include segments that display and discuss "eavedrops", carved wooden figuresHenry VIII had built into theeaves (overhanging edges of the beams in the ceiling) ofHampton Court to discourage unwanted gossip or dissension from the King's wishes and rule, to foment paranoia and fear,[2] and demonstrate that everything said there was being overheard; literally, that the walls had ears.[3]

Techniques

[edit]

Eavesdropping vectors includetelephone lines,cellular networks,email, and other methods of private instant messaging. Devices that supportVoIP and other communication software are also vulnerable to electronic eavesdropping by computer viruses categorized astrojan viruses or more broadly asspyware.[4]

Network attacks

[edit]

Network eavesdropping is a network layer attack that focuses on capturing smallpackets from the network transmitted by other computers and reading the data content in search of any type of information.[5] This type of network attack is generally one of the most effective as a lack ofencryption services are used and when the connection between the two endpoints are weak and not secure.[6][7] It is also linked to the collection ofmetadata.

Security

[edit]

There is a growing importance of security in communication systems, specifically inwireless technology. The need for security measures at different levels, including software encryption, hardware protection (e.g.,trusted platform modules), and even the physical layer using wave-front engineering is as crucial than ever.[8]

Researchers have expressed the importance of addressing the privacy concerns from eavesdropping attacks because they impact the rights of users and the ability to have confidence in the devices as well as the entireInternet. Ensuring that users have trust and confidence in their Internet activities so users continue to engage actively in the system and sharedata.[9]

See also

[edit]

References

[edit]
  1. ^"eavesdrop – Definition of eavesdrop in English by Oxford Dictionaries".Oxford Dictionaries – English. Archived fromthe original on August 11, 2017. RetrievedSeptember 10, 2023.
  2. ^abInside the Court of Henry VIII. Public Broadcasting Service. April 8, 2016.
  3. ^Stollznow, Karen (August 7, 2014)."Eavesdropping: etymology, meaning, and some creepy little statues".KarenStollznow.com. Archived fromthe original on July 28, 2018. RetrievedJune 23, 2016.
  4. ^Garner, p. 550[full citation needed]
  5. ^"TeamMentor 3.5".vulnerabilities.teammentor.net. Archived fromthe original on September 27, 2019. RetrievedSeptember 27, 2019.
  6. ^"What Are Eavesdropping Attacks?".Fortinet. RetrievedOctober 2, 2021.
  7. ^"What Are Eavesdropping Attacks & How To Prevent Them".Verizon Enterprise. RetrievedMay 3, 2024.
  8. ^Ma, Jianjun; Shrestha, Rabi; Adelberg, Jacob; Yeh, Chia-Yi; Hossain, Zahed; Knightly, Edward; Jornet, Josep Miquel; Mittleman, Daniel M. (November 2018)."Security and eavesdropping in terahertz wireless links".Nature.563 (7729):89–93.Bibcode:2018Natur.563...89M.doi:10.1038/s41586-018-0609-x.ISSN 1476-4687.PMID 30323288.S2CID 53085137.
  9. ^Anajemba, Joseph Henry; Iwendi, Celestine; Razzak, Imran; Ansere, James Adu; Okpalaoguchi, Izuchukwu Michael (2022)."A Counter-Eavesdropping Technique for Optimized Privacy of Wireless Industrial IoT Communications".IEEE Transactions on Industrial Informatics.18 (9):6445–6454.doi:10.1109/TII.2021.3140109. RetrievedFebruary 9, 2024.

External links

[edit]
Related security categories
vectorial version
vectorial version
Threats
Defenses
Analysis
Devices and
communications
Tradecraft and
techniques
Operations
Collection
Human (HUMINT)
Clandestine
Espionage
Signals (SIGINT)
Measurement and
signature (MASINT)
Other
Analysis
Dissemination
Retrieved from "https://en.wikipedia.org/w/index.php?title=Eavesdropping&oldid=1243328136"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp