Sniffing and Spoofing in Computer Security

Authors

  • Saddam RA Pamulang University
  • Angga Pranata Pamulang University
  • Sugiono Pamulang University
  • Rizki Zulanggara Pamulang University
  • Nur Halimah Pamulang University
  • Sri Nur H Pamulang University
  • Rosdiana SM Pamulang University
  • Nurhalim Pamulang University
  • Aprina Handayani Pamulang University

DOI:

https://doi.org/10.55927/ijis.v2i6.4528

Keywords:

Sniffing, Spooffing, Computer Security

Abstract

The development of Information Technology (IT) has changed people's mindset. The presence of the Internet as the main platform for online activity is vulnerable to criminal acts by irresponsible parties. Criminal acts in cyberspace, of course, pose a major threat to the governance of online activities. One of these major threats is the threat of network security. Networks connected to the internet are basically insecure and can always be exploited by hackers, both LAN and wireless networks. The internet network has two data transmission media, namely wired and wireless. what happens is open. Examples of network security threats that often occur are sniffing of activities on the network (sniffing) and also impersonation by other people (spoofing). This resume article aims to identify criminal acts that threaten computer security, namely Sniffing and Spoofing

Downloads

Download data is not yet available.

References

S. M. Metev and V. P. Veiko, Laser Assisted Microtechnology, 2nd ed., R. M.

John D.Howard “computer security” An Analysis of Security Incidents on The Internet.

J. Padhye, V. Firoiu, and D. Towsley, “A stochastic model of TCP Reno congestion avoidance and control,” Univ. of Massachusetts, Amherst, MA, CMPSCI Tech. Rep. 99-02, 1999.

https://sslindonesia.com/sniffing-dan-spoffing-pada-keamanan-website-ssl-indonesia/

Buyung Dwi Permana “Implementasi Sniffing Pada Jaringan HTTP Menggunakan Wireshark” Universitas Perjuangan Tasikmalaya.

E. Kumara, “Analisis Paket Data dengan Mengunakan Wireshark dan Command Prompt,” 2017.

Marselina Liren “Kajian Software Penyadap: Sniffing” https://cbn.ac.id/my/blog/view/265/kajian-software-penyadap-sniffing

Downloads

Published

2023-06-30

How to Cite

Saddam RA, Angga Pranata, Sugiono, Rizki Zulanggara, Nur Halimah, Sri Nur H, Rosdiana SM, Nurhalim, & Aprina Handayani. (2023). Sniffing and Spoofing in Computer Security. International Journal of Integrative Sciences, 2(6), 869–874. https://doi.org/10.55927/ijis.v2i6.4528

Issue

Section

Articles