Defination:
A passive cyber attack where an attacker
secretly listens to or monitors
communication between two parties to
steal information.
Eavesdropping
Attacker gains access to the communication
channel (e.g., network cables, Wi-Fi signals).
Listens to the ongoing transmission without
altering it.
Extracts sensitive data such as passwords,
messages, or financial details.
How it Works:
Passive – No change is made to the
original communication.
Hard to detect — sender and receiver
usually don’t notice.
Can target emails, calls, chats, or data
transfers.
Key
Characteristics
Theft of personal or financial
information.
Exposure of confidential business
data.
Identity theft and fraud.
Risks
Use encrypted protocols (HTTPS,
SSL/TLS).
Enable VPN while browsing on public
networks.
Avoid sending sensitive data over
insecure connections.
Prevention
Defination:
Small text files stored in a user’s
browser by websites to
remember information about
the user.
Cookies
1. Session Cookies - Temporary; deleted when
browser closes.
2. Persistent Cookies - Remain saved for a set
time to remember login or preferences.
3. Tracking Cookies - Monitor user activity
across websites.
Types of Cookies
Store login details and
preferences.
Remember shopping cart items.
Provide personalized content.
Purpose
Faster website loading.
Better user experience.
Saves time by remembering
settings.
Benefits
Tracking cookies can invade privacy.
Data could be exploited for targeted
ads.
In case of a breach, sensitive
information might be exposed.
Risks
Clear cookies regularly.
Restrict third-party cookies in
browser settings.
Use privacy-focused browsers or
extensions.
Best Practices