{"id":3647,"date":"2018-02-15T17:43:49","date_gmt":"2018-02-15T22:43:49","guid":{"rendered":"http:\/\/community.mis.temple.edu\/mis5212sec001sec701sp2018\/?p=3647"},"modified":"2018-02-15T17:43:49","modified_gmt":"2018-02-15T22:43:49","slug":"hackers-can-now-steal-data-even-from-faraday-cage-air-gapped-computers","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/mis5212sec001sec701sp2018\/2018\/02\/15\/hackers-can-now-steal-data-even-from-faraday-cage-air-gapped-computers\/","title":{"rendered":"\u201cHackers Can Now Steal Data Even From Faraday Cage Air-Gapped Computers\u201d"},"content":{"rendered":"<p>\u201cHackers Can Now Steal Data Even From Faraday Cage Air-Gapped Computers\u201d<\/p>\n<p>In Wireless Network Security, given the nature of physics related to Wireless Signal propagation in the air, exposure of Wireless Radio Frequency waves beyond intended security perimeter such as building or room had always been an issue. When signal is bleeding outside of building and is reachable from a cafe shop across the street, it must be considered as a big problem because a a hacker can perform malicious activities while drinking coffee in a cafe shop across the street without even necessity to get into the building. While this is an issue, companies for many years have been accepting this fact \u201cas-is\u201d and protected wireless access by applying best industry practices (such as Changing Passcode every 3-6 months) and implementing appropriate wireless security to prevent from malicious eavesdropping.<\/p>\n<p>While general wireless security solutions work for most organizations, some organizations may need to have workstation completely isolated from network communications. A \u201cFaraday Cage\u201d is what usually used to achieve complete isolation from network by containment of any signal transmission within the cage where critical workstation reside.<\/p>\n<p><a href=\"https:\/\/thehackernews.com\/2018\/02\/airgap-computer-hacking.html\" rel=\"nofollow\">https:\/\/thehackernews.com\/2018\/02\/airgap-computer-hacking.html<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u201cHackers Can Now Steal Data Even From Faraday Cage Air-Gapped Computers\u201d In Wireless Network Security, given the nature of physics related to Wireless Signal propagation in the air, exposure of Wireless Radio Frequency waves beyond intended security perimeter such as building or room had always been an issue. When signal is bleeding outside of building [&hellip;]<\/p>\n","protected":false},"author":12917,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[715219],"tags":[],"class_list":{"0":"post-3647","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-week-03-it-administrative-controls","7":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sec701sp2018\/wp-json\/wp\/v2\/posts\/3647","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sec701sp2018\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sec701sp2018\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sec701sp2018\/wp-json\/wp\/v2\/users\/12917"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sec701sp2018\/wp-json\/wp\/v2\/comments?post=3647"}],"version-history":[{"count":1,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sec701sp2018\/wp-json\/wp\/v2\/posts\/3647\/revisions"}],"predecessor-version":[{"id":3648,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sec701sp2018\/wp-json\/wp\/v2\/posts\/3647\/revisions\/3648"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sec701sp2018\/wp-json\/wp\/v2\/media?parent=3647"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sec701sp2018\/wp-json\/wp\/v2\/categories?post=3647"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sec701sp2018\/wp-json\/wp\/v2\/tags?post=3647"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}