SlideShare a Scribd company logo
Chapter 1

THE INCREASING ISSUES
OF ONLINE SECURITY
Brainstorming
 People who fall in love with the Internet do so for






different reasons.
Many love the ability to quickly and cheaply keep up with
friends and loved ones via e-mail,
while others love the vast oceans of information or
the rush of playing Internet games.
However, it's likely that most Internet users share one
thing in common as they surf: the last thing on

their minds is information system
security.
Brainstorming

How about YOU class?
 While that's understandable, it's also a big mistake.

It is important to remember that surfing the Internet
comes with certain inherent risks.
 When you log onto the Internet, you step into the
public arena, even if you're surfing from a bedroom.
Identify the Internet Services
 Electronic mail and news
 File transfer
 Remote Access to Host
 Real time conferencing services
Electronic mail and news


Ways for people to exchange information with
each other without requiring an immediate,
interactive response.
File transfer
Transmitting files over a computer network or the
Internet.
 The simplest way to exchange files between
computers on the Internet.

Remote Access to Host
The ability to log onto a network from a distant location.
 Eg: Telnet

Real time conferencing services


Designed for interactive use by on-line participants.
Describe the Risk of Network Intrusion
 Information Theft
 Unauthorized Disclosure
 Information Warfare
 Accidental Data Loss
Information Theft
Unauthorised Disclosure
 That an organization suspects some of its employees of

leaking confidential information to its competitor.
 It is also usually believed that its competitor actually

planted spies within the organization in order to target and
steal new product plan.
Information Warfare
 The use and management of information in pursuit of a

competitive advantage over an opponent.
Accidental data loss
QUIZ
Categories of Security Threats
Data modification

•

A modification attack is an attempt to modify information that
an attacker is not authorized to modify.
Hacking


Computer hacking is the practice of modifying
computer hardware and software to accomplish a
goal outside of the creator’s original purpose.



Act of gaining access without legal authorization to a
computer or computer network.



People who engage in computer hacking activities are
often called hackers.
Cracking


Activities to breaks into someone else's computer
system, bypasses passwords or licenses in computer
programs.



A cracker can be doing this for profit, maliciously, for
some altruistic purpose or cause, or because the
challenge is there.
Spoofing

 A method of attacking a computer program, in which

the program is modified so as to appear to be
working normally when in reality it has been
modified with the purpose to circumvent security
mechanisms.
Sniffing

 Sniffing is the method that a network device, like

the Nintendo DS, uses to identify available wireless
networks in the area.

More Related Content

What's hot

Hacking
HackingHacking
Hacking
Nadeem Ahmad
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKING
SHERALI445
 
9 ethics in it space
9 ethics in it space9 ethics in it space
9 ethics in it space
Alwyn Dalmeida
 
Hacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer NetworksHacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer Networks
Srikanth VNV
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
anas_desa
 
Internet security
Internet securityInternet security
Internet security
at1211
 
Hacking and its types V2
Hacking and its types V2Hacking and its types V2
Hacking and its types V2
Mian Khayyam
 
National information security education & awareness program
National information security education & awareness programNational information security education & awareness program
National information security education & awareness program
Neel Kamal
 
Fs Ch 19
Fs Ch 19Fs Ch 19
Fs Ch 19
warren142
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
Neel Kamal
 
Network Threats
Network ThreatsNetwork Threats
Network Threats
Dan Oblak
 
Hacking
HackingHacking
Hacking
Purohit Rock
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
Neilg42
 
A to z of Cyber Crime
A to z of Cyber CrimeA to z of Cyber Crime
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
university of mumbai
 
Ransomware 101
Ransomware 101Ransomware 101
Ransomware 101
William Mann
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy control
Sifat Hossain
 
Black hat hackers
Black hat hackersBlack hat hackers
Black hat hackers
Santosh Kumar
 
Hacking
HackingHacking
Hacking
Asma Khan
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Teja Babu
 

What's hot (20)

Hacking
HackingHacking
Hacking
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKING
 
9 ethics in it space
9 ethics in it space9 ethics in it space
9 ethics in it space
 
Hacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer NetworksHacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer Networks
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Internet security
Internet securityInternet security
Internet security
 
Hacking and its types V2
Hacking and its types V2Hacking and its types V2
Hacking and its types V2
 
National information security education & awareness program
National information security education & awareness programNational information security education & awareness program
National information security education & awareness program
 
Fs Ch 19
Fs Ch 19Fs Ch 19
Fs Ch 19
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Network Threats
Network ThreatsNetwork Threats
Network Threats
 
Hacking
HackingHacking
Hacking
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
A to z of Cyber Crime
A to z of Cyber CrimeA to z of Cyber Crime
A to z of Cyber Crime
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
 
Ransomware 101
Ransomware 101Ransomware 101
Ransomware 101
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy control
 
Black hat hackers
Black hat hackersBlack hat hackers
Black hat hackers
 
Hacking
HackingHacking
Hacking
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Similar to Fp611 kuliah 2

Effects of using IT
Effects of using ITEffects of using IT
Effects of using IT
Mirza Ćutuk
 
Types of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security ThreatsTypes of Cyber Crimes and Security Threats
Network security chapter 1,2
Network security chapter  1,2Network security chapter  1,2
Network security chapter 1,2
Education
 
Data+security+sp10
Data+security+sp10Data+security+sp10
Data+security+sp10
ismaelhaider
 
Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
Adebisi Tolulope
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
MuhammadRobeel3
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
Rashed Sayyed
 
Hackingppt 160730081605
Hackingppt 160730081605Hackingppt 160730081605
Hackingppt 160730081605
RAKESH SHARMA
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
Rashed Sayyed
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
Adeel Khurram
 
Security.pptx
Security.pptxSecurity.pptx
Security.pptx
john6938
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Salma Zafar
 
New internet security
New internet securityNew internet security
New internet security
university of mumbai
 
The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking
- Mark - Fullbright
 
Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure" Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Small Business
 
Hamza
HamzaHamza
Hamza
HamzaBaqee
 
Unit 03 Computer and Internet Crime [5 hrs] v1.2.pdf
Unit 03 Computer and Internet Crime [5 hrs] v1.2.pdfUnit 03 Computer and Internet Crime [5 hrs] v1.2.pdf
Unit 03 Computer and Internet Crime [5 hrs] v1.2.pdf
SujanTimalsina5
 
Information Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons BulgariaInformation Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons Bulgaria
New Horizons Bulgaria
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
JoselitoJMebolos
 
Need For Ethical & Security Issue In It
Need For Ethical & Security Issue In ItNeed For Ethical & Security Issue In It
Need For Ethical & Security Issue In It
Sonali Srivastava
 

Similar to Fp611 kuliah 2 (20)

Effects of using IT
Effects of using ITEffects of using IT
Effects of using IT
 
Types of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security ThreatsTypes of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security Threats
 
Network security chapter 1,2
Network security chapter  1,2Network security chapter  1,2
Network security chapter 1,2
 
Data+security+sp10
Data+security+sp10Data+security+sp10
Data+security+sp10
 
Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Hackingppt 160730081605
Hackingppt 160730081605Hackingppt 160730081605
Hackingppt 160730081605
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
Security.pptx
Security.pptxSecurity.pptx
Security.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
New internet security
New internet securityNew internet security
New internet security
 
The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking
 
Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure" Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure"
 
Hamza
HamzaHamza
Hamza
 
Unit 03 Computer and Internet Crime [5 hrs] v1.2.pdf
Unit 03 Computer and Internet Crime [5 hrs] v1.2.pdfUnit 03 Computer and Internet Crime [5 hrs] v1.2.pdf
Unit 03 Computer and Internet Crime [5 hrs] v1.2.pdf
 
Information Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons BulgariaInformation Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons Bulgaria
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Need For Ethical & Security Issue In It
Need For Ethical & Security Issue In ItNeed For Ethical & Security Issue In It
Need For Ethical & Security Issue In It
 

Recently uploaded

How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 

Recently uploaded (20)

How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 

Fp611 kuliah 2

  • 1. Chapter 1 THE INCREASING ISSUES OF ONLINE SECURITY
  • 2. Brainstorming  People who fall in love with the Internet do so for     different reasons. Many love the ability to quickly and cheaply keep up with friends and loved ones via e-mail, while others love the vast oceans of information or the rush of playing Internet games. However, it's likely that most Internet users share one thing in common as they surf: the last thing on their minds is information system security.
  • 3. Brainstorming How about YOU class?  While that's understandable, it's also a big mistake. It is important to remember that surfing the Internet comes with certain inherent risks.  When you log onto the Internet, you step into the public arena, even if you're surfing from a bedroom.
  • 4. Identify the Internet Services  Electronic mail and news  File transfer  Remote Access to Host  Real time conferencing services
  • 5. Electronic mail and news  Ways for people to exchange information with each other without requiring an immediate, interactive response.
  • 6. File transfer Transmitting files over a computer network or the Internet.  The simplest way to exchange files between computers on the Internet. 
  • 7. Remote Access to Host The ability to log onto a network from a distant location.  Eg: Telnet 
  • 8. Real time conferencing services  Designed for interactive use by on-line participants.
  • 9. Describe the Risk of Network Intrusion  Information Theft  Unauthorized Disclosure  Information Warfare  Accidental Data Loss
  • 11. Unauthorised Disclosure  That an organization suspects some of its employees of leaking confidential information to its competitor.  It is also usually believed that its competitor actually planted spies within the organization in order to target and steal new product plan.
  • 12. Information Warfare  The use and management of information in pursuit of a competitive advantage over an opponent.
  • 14. QUIZ
  • 16. Data modification • A modification attack is an attempt to modify information that an attacker is not authorized to modify.
  • 17. Hacking  Computer hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  Act of gaining access without legal authorization to a computer or computer network.  People who engage in computer hacking activities are often called hackers.
  • 18. Cracking  Activities to breaks into someone else's computer system, bypasses passwords or licenses in computer programs.  A cracker can be doing this for profit, maliciously, for some altruistic purpose or cause, or because the challenge is there.
  • 19. Spoofing  A method of attacking a computer program, in which the program is modified so as to appear to be working normally when in reality it has been modified with the purpose to circumvent security mechanisms.
  • 20. Sniffing  Sniffing is the method that a network device, like the Nintendo DS, uses to identify available wireless networks in the area.