Examining potential threats of eavesdropping in TCP stream of personal interactive transmission session

This study establishes that Personal Interactive Transmission Sessions conducted using TCP streams provide exceptional convenience and immediacy. However, they also provide noteworthy challenges and considerations, especially in terms of security, integrity, an...

Full description

Saved in:
Bibliographic Details
Main Authors: Abubakar Ibrahim, Adamu, Muhammed Najmuddin, Nadhirah, Mohd Alwi, Rabiatul Adawiyah, Mohamad Faizal, Nur Amirotul Izzah
Format: Article
Language:English
Published: IIUM Press 2024
Subjects:
Online Access:http://irep.iium.edu.my/110576/2/110576_Examining%20potential%20threats%20of%20eavesdropping.pdf
http://irep.iium.edu.my/110576/
https://journals.iium.edu.my/kict/index.php/IJPCC/article/view/461/277
https://doi.org/10.31436/ijpcc.v10i1.461
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Islam Antarabangsa Malaysia
Language: English
Description
Summary:This study establishes that Personal Interactive Transmission Sessions conducted using TCP streams provide exceptional convenience and immediacy. However, they also provide noteworthy challenges and considerations, especially in terms of security, integrity, and performance. This study investigates the security weaknesses present in potential eavesdropping threats on TCP Streams during personal interactive transmission sessions. An experimental analysis was carried out,by doing a comprehensive analysis of network traffic using Wireshark. The investigation reveals a notable vulnerability in the management of user-provided data, together with the possible risks of eavesdropping, emphasizing the urgent need for enhanced security measures. The findings underscore the need of proactive cybersecurity strategies, such as frequent security audits, vulnerability assessments, and the implementation of robust encryption methods, to safeguarduser privacy and ensure data integrity. To enhance risk mitigation, data protection, and user confidence in the digital environment, organizations should prioritize addressing potential eavesdropping threats during transmission sessions that involve sensitive personal data.