Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Eavesdropping

Handbook of Research on Cyber Crime and Information Privacy
It literally means listening in a hidden way.
Published in Chapter:
POSMASWEB: Paranoid Operating System Methodology for Anonymous and Secure Web Browsing
Nuno Ricardo Mateus-Coelho (Universidade de Trás-os-Montes e Alto Douro, Portugal), Benjamim Ribeiro Fonseca (Universidade de Trás-os-Montes e Alto Douro, Portugal), and António Vieira Castro (Instituto Superior de Engenharia do Porto, Portugal)
Copyright: © 2021 |Pages: 32
DOI: 10.4018/978-1-7998-5728-0.ch023
Abstract
It has recently been discovered that large companies and nations “observe” their customers and citizens, disregarding any remaining moral and technological lines, being able to listen to telephone conversations and monitoring communications through powerful monitoring and surveillance programs. Elsewhere on the planet, nations in turmoil or wrapped in a cloak of censorship persecute their citizens, controlling them by denying them access to the free web without the threat of repercussions that threatens their dignity. To support the present research, an analysis of platforms that allow anonymous and secure browsing and a study of technologies and programs with potential privacy breach and computer intrusion were performed. The main objective of this work was to analyse the computer monitoring and surveillance technologies, identifying the available tools, trying to find potential solutions, developing and providing a methodology that enhances any desktop, server, or mobile operating system, with characteristics that combat the exposed in this summary.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Emerging Security Issues in VANETS for E-Business
Is a passive attack. An attacker listens to the communication and gets information about the content of the message.
Full Text Chapter Download: US $37.50 Add to Cart
Internet of Things: Architecture, Challenges, and Future Directions
The attack in which attacker access and redeem the communication traffic among IOT components.
Full Text Chapter Download: US $37.50 Add to Cart
Security Issues of Smartphones Regarding M-Commerce
Listening to the private conversation of others without their allowance and in an unethical manner.
Full Text Chapter Download: US $37.50 Add to Cart
Internet of Things (IoT)
Eavesdropping is the act of secretly listening/viewing the private conversation of others without their consent.
Full Text Chapter Download: US $37.50 Add to Cart
Optimized Three-Dimensional Security Framework to Mitigate Risks Arising From BYOD-Enabled Business Environment
An unauthorized real-time interception of a private communication, such as instant message, a phone call, or videoconference.
Full Text Chapter Download: US $37.50 Add to Cart
Security and Ethical Concerns of Affective Algorithmic Music Composition in Smart Spaces
It is an unethical act in which an individual illegitimately intercept a private conversation, communication, digital transmission, or activities of others without their consent.
Full Text Chapter Download: US $37.50 Add to Cart
A Holistic Perspective of Security in Health Related Virtual Communities
A malicious user is spying information exchanged between community members and collects useful information.
Full Text Chapter Download: US $37.50 Add to Cart
Hackers, Hacking, and Eavesdropping
Eavesdropping is the intercepting of conversations by unintended recipients. One who participates in eavesdropping is called an eavesdropper.
Full Text Chapter Download: US $37.50 Add to Cart
Securing the Human Cloud: Applying Biometrics to Wearable Technology
It is a type of attack wherein adversaries “listen in” on packets that are in transit.
Full Text Chapter Download: US $37.50 Add to Cart
BDS: Browser Dependent XSS Sanitizer
It is the process of illegal interception of packets transmitted by other computers from a network. It is also known as sniffing, whose main motto is to confidentially listening the other’s information without their permission.
Full Text Chapter Download: US $37.50 Add to Cart
Social Engineering and Data Privacy
The practice of passively listening to someone’s conversation such as via wiretapping
Full Text Chapter Download: US $37.50 Add to Cart
MANET: Enhanced Lightweight Sybil Attack Detection Technique
Unauthorized monitoring of other people’s communications. It can be conducted on ordinary telephone systems, emails, instant messaging or other Internet services. Since eavesdropping activities do not affect the normal operation of network transmission, both the sender and the recipient can hardly notice that the data has been stolen, intercepted or defaced.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR