{"id":3193,"date":"2016-09-04T17:40:33","date_gmt":"2016-09-04T21:40:33","guid":{"rendered":"http:\/\/community.mis.temple.edu\/itacs5211fall16\/?p=3193"},"modified":"2016-09-04T17:40:33","modified_gmt":"2016-09-04T21:40:33","slug":"hacking-air-gapped-networks","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/2016\/09\/04\/hacking-air-gapped-networks\/","title":{"rendered":"Hacking Air \u2013 Gapped Networks"},"content":{"rendered":"<p>\u201cHacking Air \u2013 Gapped Networks\u201d, this article blew my mind. The level at which these researchers and ethical hackers used to exfiltrate data from pc\u2019s isolated from the internet is unbelievable. They were able to collect data using acoustic sounds, electromagnetic waves, sound waves and even heat emissions generated by the pc\u2019s. The sole purpose of implementing an air gap network is to ensure your network is secure and out of reach from an unsecure network. I would have never imagine using the above methods to capture information such as encryption keys, usernames and password in such a manner.<\/p>\n<p>This article was really an eye opener and just made this class even more exciting\/interesting to be in.<\/p>\n<p><a href=\"http:\/\/resources.infosecinstitute.com\/hacking-air-gapped-networks\/\">http:\/\/resources.infosecinstitute.com\/hacking-air-gapped-networks\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u201cHacking Air \u2013 Gapped Networks\u201d, this article blew my mind. The level at which these researchers and ethical hackers used to exfiltrate data from pc\u2019s isolated from the internet is unbelievable. They were able to collect data using acoustic sounds, electromagnetic waves, sound waves and even heat emissions generated by the pc\u2019s. The sole purpose [&hellip;]<\/p>\n","protected":false},"author":12710,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[1],"tags":[],"class_list":{"0":"post-3193","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-uncategorized","7":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts\/3193","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/users\/12710"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/comments?post=3193"}],"version-history":[{"count":1,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts\/3193\/revisions"}],"predecessor-version":[{"id":3194,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts\/3193\/revisions\/3194"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/media?parent=3193"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/categories?post=3193"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/tags?post=3193"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}