INFO5301 T utorial 3
Information Security Management
Motivation
Networking is an essential aspect for many organisations and also one of the biggest threat to in-
formation security. In exchanging information, we rely on data encryption as a way to preserve
confidentiality. However, can data encryption preserve the confidentiality 100%? We also learned
that it is impossible to provide absolute security (Basic Principle 1 - Week 2 lecture) when informa-
tion are interconnected. This tutorial provides you experimental validation that confidentiality can
be compromised even without data disclosure due to passive information leakage in networking. At
the end of experiments, the tutorial guides you to discuss potential attacks as well as benign services
that can be developed exploiting passive information leakage.
—————————————————————————————————————————
You will be working in a group to capture network traffic patterns. Each group is given a
different service to capture and will answer 2questions.
1 Group 1 and 2: Zoom (Video Conferencing)
1.1 Inspecting Traffic Patterns
1