Examining potential threats of eavesdropping in TCP stream of personal interactive transmission session

This study establishes that Personal Interactive Transmission Sessions conducted using TCP streams provide exceptional convenience and immediacy. However, they also provide noteworthy challenges and considerations, especially in terms of security, integrity, an...

Full description

Saved in:
Bibliographic Details
Main Authors: Abubakar Ibrahim, Adamu, Muhammed Najmuddin, Nadhirah, Mohd Alwi, Rabiatul Adawiyah, Mohamad Faizal, Nur Amirotul Izzah
Format: Article
Language:English
Published: IIUM Press 2024
Subjects:
Online Access:http://irep.iium.edu.my/110576/2/110576_Examining%20potential%20threats%20of%20eavesdropping.pdf
http://irep.iium.edu.my/110576/
https://journals.iium.edu.my/kict/index.php/IJPCC/article/view/461/277
https://doi.org/10.31436/ijpcc.v10i1.461
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Islam Antarabangsa Malaysia
Language: English
id my.iium.irep.110576
record_format dspace
spelling my.iium.irep.1105762024-01-29T03:57:10Z http://irep.iium.edu.my/110576/ Examining potential threats of eavesdropping in TCP stream of personal interactive transmission session Abubakar Ibrahim, Adamu Muhammed Najmuddin, Nadhirah Mohd Alwi, Rabiatul Adawiyah Mohamad Faizal, Nur Amirotul Izzah Q300 Cybernetics This study establishes that Personal Interactive Transmission Sessions conducted using TCP streams provide exceptional convenience and immediacy. However, they also provide noteworthy challenges and considerations, especially in terms of security, integrity, and performance. This study investigates the security weaknesses present in potential eavesdropping threats on TCP Streams during personal interactive transmission sessions. An experimental analysis was carried out,by doing a comprehensive analysis of network traffic using Wireshark. The investigation reveals a notable vulnerability in the management of user-provided data, together with the possible risks of eavesdropping, emphasizing the urgent need for enhanced security measures. The findings underscore the need of proactive cybersecurity strategies, such as frequent security audits, vulnerability assessments, and the implementation of robust encryption methods, to safeguarduser privacy and ensure data integrity. To enhance risk mitigation, data protection, and user confidence in the digital environment, organizations should prioritize addressing potential eavesdropping threats during transmission sessions that involve sensitive personal data. IIUM Press 2024-01-28 Article PeerReviewed application/pdf en http://irep.iium.edu.my/110576/2/110576_Examining%20potential%20threats%20of%20eavesdropping.pdf Abubakar Ibrahim, Adamu and Muhammed Najmuddin, Nadhirah and Mohd Alwi, Rabiatul Adawiyah and Mohamad Faizal, Nur Amirotul Izzah (2024) Examining potential threats of eavesdropping in TCP stream of personal interactive transmission session. International Journal on Perceptive and Cognitive Computing (IJPCC), 10 (1). pp. 98-104. E-ISSN 2462-229X https://journals.iium.edu.my/kict/index.php/IJPCC/article/view/461/277 https://doi.org/10.31436/ijpcc.v10i1.461
institution Universiti Islam Antarabangsa Malaysia
building IIUM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider International Islamic University Malaysia
content_source IIUM Repository (IREP)
url_provider http://irep.iium.edu.my/
language English
topic Q300 Cybernetics
spellingShingle Q300 Cybernetics
Abubakar Ibrahim, Adamu
Muhammed Najmuddin, Nadhirah
Mohd Alwi, Rabiatul Adawiyah
Mohamad Faizal, Nur Amirotul Izzah
Examining potential threats of eavesdropping in TCP stream of personal interactive transmission session
description This study establishes that Personal Interactive Transmission Sessions conducted using TCP streams provide exceptional convenience and immediacy. However, they also provide noteworthy challenges and considerations, especially in terms of security, integrity, and performance. This study investigates the security weaknesses present in potential eavesdropping threats on TCP Streams during personal interactive transmission sessions. An experimental analysis was carried out,by doing a comprehensive analysis of network traffic using Wireshark. The investigation reveals a notable vulnerability in the management of user-provided data, together with the possible risks of eavesdropping, emphasizing the urgent need for enhanced security measures. The findings underscore the need of proactive cybersecurity strategies, such as frequent security audits, vulnerability assessments, and the implementation of robust encryption methods, to safeguarduser privacy and ensure data integrity. To enhance risk mitigation, data protection, and user confidence in the digital environment, organizations should prioritize addressing potential eavesdropping threats during transmission sessions that involve sensitive personal data.
format Article
author Abubakar Ibrahim, Adamu
Muhammed Najmuddin, Nadhirah
Mohd Alwi, Rabiatul Adawiyah
Mohamad Faizal, Nur Amirotul Izzah
author_facet Abubakar Ibrahim, Adamu
Muhammed Najmuddin, Nadhirah
Mohd Alwi, Rabiatul Adawiyah
Mohamad Faizal, Nur Amirotul Izzah
author_sort Abubakar Ibrahim, Adamu
title Examining potential threats of eavesdropping in TCP stream of personal interactive transmission session
title_short Examining potential threats of eavesdropping in TCP stream of personal interactive transmission session
title_full Examining potential threats of eavesdropping in TCP stream of personal interactive transmission session
title_fullStr Examining potential threats of eavesdropping in TCP stream of personal interactive transmission session
title_full_unstemmed Examining potential threats of eavesdropping in TCP stream of personal interactive transmission session
title_sort examining potential threats of eavesdropping in tcp stream of personal interactive transmission session
publisher IIUM Press
publishDate 2024
url http://irep.iium.edu.my/110576/2/110576_Examining%20potential%20threats%20of%20eavesdropping.pdf
http://irep.iium.edu.my/110576/
https://journals.iium.edu.my/kict/index.php/IJPCC/article/view/461/277
https://doi.org/10.31436/ijpcc.v10i1.461
_version_ 1789424089555795968