Claim Missing Document
Check
Articles

Found 1 Documents
Search

Sniffing and Spoofing in Computer Security Saddam RA; Angga Pranata; Sugiono; Rizki Zulanggara; Nur Halimah; Sri Nur H; Rosdiana SM; Nurhalim; Aprina Handayani
International Journal of Integrative Sciences Vol. 2 No. 6 (2023): June 2023
Publisher : PT FORMOSA CENDEKIA GLOBAL

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55927/ijis.v2i6.4528

Abstract

The development of Information Technology (IT) has changed people's mindset. The presence of the Internet as the main platform for online activity is vulnerable to criminal acts by irresponsible parties. Criminal acts in cyberspace, of course, pose a major threat to the governance of online activities. One of these major threats is the threat of network security. Networks connected to the internet are basically insecure and can always be exploited by hackers, both LAN and wireless networks. The internet network has two data transmission media, namely wired and wireless. what happens is open. Examples of network security threats that often occur are sniffing of activities on the network (sniffing) and also impersonation by other people (spoofing). This resume article aims to identify criminal acts that threaten computer security, namely Sniffing and Spoofing