Changes

2,269 bytes added ,  22:00, 19 January 2016
Created page with "File:lighterstill.jpgright|frame ==Origin== The verb ''eavesdrop'' was originally a back-formation of the noun eavesdropper ("a person who eave..."
[[File:lighterstill.jpg]][[File:Eavesdropping.jpg|right|frame]]

==Origin==
The verb ''eavesdrop'' was originally a back-formation of the noun eavesdropper ("a person who eavesdrops") which was formed from the unrelated noun eavesdrop ("the dripping of [[water]] from the [https://en.wikipedia.org/wiki/Eaves eaves] of a house; the ground on which such water falls"). An eavesdropper was one who stood at the eavesdrop (where the water fell, i.e., near the house) so as to overhear what was said inside.
==Definition==
*1: to [[listen]] [[secretly]] to what is said in [[private]]
==Description==
'''Eavesdropping''' is secretly listening to the [[private]] conversation of others without their [[consent]], as defined by [https://en.wikipedia.org/wiki/Black%27s_Law_Dictionary Black's Law Dictionary]. This is commonly thought to be unethical and there is an old adage that "eavesdroppers seldom hear anything [[good]] of themselves... eavesdroppers always try to [[listen]] to matters that concern them."

Eavesdropping can also be done over telephone lines ([https://en.wikipedia.org/wiki/Wiretapping wiretapping]), email, instant messaging, and other [[methods]] of [[communication]] considered [[private]]. (If a message is publicly broadcast, witnessing it is not considered eavesdropping.) [https://en.wikipedia.org/wiki/VoIP VoIP] communications software is also [[vulnerable]] to electronic eavesdropping via infections such as [https://en.wikipedia.org/wiki/Trojan_horse_(computing) trojans].

Network eavesdropping is a [https://en.wikipedia.org/wiki/Network_layer network layer attack] that focuses on capturing small packets from the network transmitted by other computers and reading the data content in search of any type of information. This type of network attack is generally one of the most effective as a lack of [[encryption]] services are used. It is also linked to the collection of [https://en.wikipedia.org/wiki/Metadata metadata]. Those who perform this type of attack are generally black hat [https://en.wikipedia.org/wiki/Hacker_(computer_security) hackers]; however, government agencies, such as the [https://en.wikipedia.org/wiki/National_Security_Agency National Security Agency], have also been connected.

[[Category: Computer Science]]