Is Someone Listening? #NSA #PRISM

The ability to intercept traffic on a networking device is built into the devices themselves. It’s called a “mirror” or “span” port, and copies all traffic on one or more (or all) ports to that port for analysis through a separate device. As with any technology, it can be used for good (network shaping, or searching for malware) or evil (unconstitutional surveillance).

Domestic Spying
Source: SecurityDegreeHub.com

Comments (0)

Comments are closed.

%d bloggers like this: