Temple University

Week 6 Summary and Article

The reading for this week covered packet sniffing. The article covered aspects of sniffing switched, non-switched and wireless environments. It also talked about common applications used for sniffing as well as decryption of encrypted traffic. Some of the common methods and terminologies covered are ARP spoofing and man in the middle attacks. The article concluded by providing strategies to mitigate sniffing by either detection or locking down networks.

Articles I found interesting are:

http://www.dailydot.com/technology/tor-anonymous-os-tails-freitas/

http://thehackernews.com/2014/06/tails-operating-system-website-has-beed.html

This article is interesting because neither TAILS nor Tor can’t stop an ISP from monitoring your company’s entry and exit nodes and selling/giving data to competing firms – provided that the ISP is willing to do this and the competitor would be willing to pay for your packets which might have to decrypted.

Since there is no such thing as an anonymous Internet connection, what can firms to do prevent ISPs from providing entry and exit node packets to all entities except for the law enforcement? – From the perspective of a US firms conducting business in countries with corruption, lack of regulation, audits.etc.

Leave a Reply

Your email address will not be published. Required fields are marked *