Explain what packet sniffers do

Assignment Help Management Theories
Reference no: EM131452092

Question: One of the questions in the Guide in Chapter 4 (question 6, page 103) has your professor installing spyware on your computer so she can obtain all your instant messages, email, and Web browser traffic. Actually, obtaining that data is quite a bit easier than using spyware. All your professor, or you, has to do is to install a program called a packet analyzer, also called a packet sniffer. The former term is used when the program is used for appropriate purposes and the latter term is used otherwise. We'll use packet sniffer here. Under either name, such programs read, record, and display all of the wireless packets that are in the airwaves around them. Somewhere in your classroom there is a wireless device that is receiving and sending wireless packets to and from your computer, connecting you to the Internet, and performing a number of other functions.

All of those wireless packets have to be broadcast in the open so they can reach the intended destination (when you send, that's the wireless device; when you receive, that's your computer or mobile device). So, all the packet sniffer does is capture all of the wireless packets floating around the room and format them in an easily accessible manner. So, anyone in your classroom (and anyone near your classroom) can go to www. wireshark.com (or a similar site) and download and install a packet sniffer. Learning to use it isn't difficult, and the site provides video and other helpful documentation to speed the learning process. Once someone has done that, he or she can read nearly anything that anyone else in the room is sending or receiving over the LAN wireless network. That anything includes instant messages, most email, and any https:// Web traffic. Your professor is too professional to use a packet sniffer for such a violation of your privacy, but the guy sitting next to you may not be.

It could be he who asks you, "Does Jennifer know you say such terrible things about her?" or "Did you enjoy looking at those models on VictoriasSecret.com in class?" or perhaps, "Why were you searching for the term DUI lawyer in class today?" What can you do? Well, for one, you can use https:// instead of https://. If you do so, the packet sniffer will be able to tell that you went to a particular site, but it won't obtain data about what you did when you got there. For example, if you use https://www.google.com, the sniffer will be able to determine you went to google.com, but it won't be able to record what you searched for. However, for anything other than buying, few sites respond to both https:// and https://. You can use secure email, but almost no one else will, so that's not much help. Of course, if you never send anything that you wouldn't be proud to have published on the front page of the campus newspaper tomorrow, you won't have a problem with what you say. That doesn't help when flakey friends send you sensational material, however. The ultimate protection is not to use your computer or mobile device for any unauthorized purpose while in class.

1. Explain what packet sniffers do and describe the situation that enables them to succeed.

2. Besides your classroom, what other places do you visit for which packet sniffing might be a problem for you?

3. List five ways that you can protect yourself from packet sniffing.

4. List the evidence you have that your traffic has never been sniffed. You can answer this question with one word.

5. Is packet sniffing illegal? Is it unethical? Explain your answers.

6. If you use a mobile device, but connect with the cell tower wireless instead of the classroom's LAN, are you protected from packet sniffing? Why or why not?

7. Summarize your conclusions about your future behavior regarding wireless use in class.

8. [Optional for high achievers or sniffers in training] Go to www.wireshark.com and watch the introductory video. Explain how their packet sniffer formats wireless packets for easy consumption. List terms used in the video that you learned in this chapter.

Reference no: EM131452092

Questions Cloud

Proposed product-facility-entity or service : In this paper, we present the IBM Watson as an analytic data software for the Crisp Hospital.
Explore the concept of power distance and its impact : Explore the concept of power distance and its impact on the workplace and social issues as a whole. Be specific with examples.
Define ethical custom : Alliance Partners (a fictitious name) is a data broker. You'll learn about data brokers in Chapter 9, but for now, just know that such companies acquire and buy
What is strategic role that corporate social responsibility : What is the strategic role that corporate social responsibility and codes of ethics play in global management? What are the political risk corporation may face?
Explain what packet sniffers do : One of the questions in the Guide in Chapter 4 (question 6, page 103) has your professor installing spyware on your computer so she can obtain all your instant
Organizational change and development : Discuss some of the unpredictable challenges that can occur when change is implemented. How can these affect sustainability?
What is the outcome of ians response to the situation : What is the outcome of Ian's response to the situation? If Ian does not report Ellen, what is the struggle within Ian's mind? What should Ian do and why?
Improve efficiency which in turn boosts the productivity : Information systems are usually important for business and therefore they develop them due to the following:
Identify at least three ethical and legal issues : Identify at least three ethical and legal issues that should be considered when making the decision of where to locate the convention.

Reviews

Write a Review

Management Theories Questions & Answers

  Learning in action

Learning contract proposal that will form the basis of your learning contract report.

  Change is the only constant

"Change is the only constant " Evaluate the different types of change that have occurred in Sony.

  How do advertisers try to use group influence

How do advertisers try to use group influence?  Will you find any specific examples and explain the relevant theory of group behavior and influence?

  Case study:saving sony

You have been appointed by Sony as a consultant on change management. Advise Sony on how they could implement the change by using the various theories of change you have learnt.

  How the stock market works

The purpose of this project is to help you to gain an understanding of how the stock market works and of the relationship between theory and practice.

  Find the optimal production quantities

Find not only the optimal production quantities, but also the optimal total cost.

  Describe the management process

Describe the management process and identify the skills required to manage business organizations.

  Case study : bert''s bonsai and aquatic sport museum

Case Study : Bert's Bonsai and Aquatic Sport Museum Prepare a knowledge management system.

  Knowledge management techniques

Demonstrate understanding of the many-sided nature of knowledge management

  Theory of transtheoretical model

Demonstrate understanding of the many-sided nature of knowledge management

  Write a paper on historical trends of management

Write a paper on Historical Trends of Management.

  Theory of reasoned action

Theory of Planned Behavior and Integrated Behaviors Model

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd