{"title":"窃听技术在信息战中的作用——现状、挑战和未来趋势","authors":"S. Sadkhan","doi":"10.1109/IT-ELA52201.2021.9773702","DOIUrl":null,"url":null,"abstract":"The term “Eavesdropping” is used to refer to the interception of communication between two parties by a malicious third party. Since the beginning of the digital age, the term has also become of great importance in the world of cybersecurity. Eavesdropping on the digital network takes the form of sniffing this data from websites. Special programs are developed by hackers to search for and record bits of sensitive data communications from insecure networks. These packets of information are then analyzed using advanced encryption tools, or simply read or listen to them in the hope of accessing valuable information. It is one of the tools used in information warfare and the victims are not only computers, companies, or targeted economies, but tens of millions of people who depend. On these information systems for their survival.","PeriodicalId":330552,"journal":{"name":"2021 2nd Information Technology To Enhance e-learning and Other Application (IT-ELA)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Eavesdropping Techniques Role in Information Warfare - Status, Challenges and Future trends\",\"authors\":\"S. Sadkhan\",\"doi\":\"10.1109/IT-ELA52201.2021.9773702\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The term “Eavesdropping” is used to refer to the interception of communication between two parties by a malicious third party. Since the beginning of the digital age, the term has also become of great importance in the world of cybersecurity. Eavesdropping on the digital network takes the form of sniffing this data from websites. Special programs are developed by hackers to search for and record bits of sensitive data communications from insecure networks. These packets of information are then analyzed using advanced encryption tools, or simply read or listen to them in the hope of accessing valuable information. It is one of the tools used in information warfare and the victims are not only computers, companies, or targeted economies, but tens of millions of people who depend. On these information systems for their survival.\",\"PeriodicalId\":330552,\"journal\":{\"name\":\"2021 2nd Information Technology To Enhance e-learning and Other Application (IT-ELA)\",\"volume\":\"16 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-12-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 2nd Information Technology To Enhance e-learning and Other Application (IT-ELA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IT-ELA52201.2021.9773702\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 2nd Information Technology To Enhance e-learning and Other Application (IT-ELA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IT-ELA52201.2021.9773702","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Eavesdropping Techniques Role in Information Warfare - Status, Challenges and Future trends
The term “Eavesdropping” is used to refer to the interception of communication between two parties by a malicious third party. Since the beginning of the digital age, the term has also become of great importance in the world of cybersecurity. Eavesdropping on the digital network takes the form of sniffing this data from websites. Special programs are developed by hackers to search for and record bits of sensitive data communications from insecure networks. These packets of information are then analyzed using advanced encryption tools, or simply read or listen to them in the hope of accessing valuable information. It is one of the tools used in information warfare and the victims are not only computers, companies, or targeted economies, but tens of millions of people who depend. On these information systems for their survival.