Principles of Information Security (MindTap Course List)
Principles of Information Security (MindTap Course List)
6th Edition
ISBN: 9781337102063
Author: Michael E. Whitman, Herbert J. Mattord
Publisher: Cengage Learning
Question
Book Icon
Chapter 2, Problem 3E
Program Plan Intro

Phone phreaking:

Phone phreaking is a technique in which phone phreaks spend their time dialling around the telephone and trying to learn the pattern of tones to know how the calls were routed, how to imitate operators and other company personnel, trying to know the concealed telephone company technical journals, digging into the telephone company trash bins so as to know the confidential documents. This lead to the invention of electronic devices like blue boxes, red boxes and black boxes which helped the hackers to access the network and make free phone calls. Thus it started gaining popularity as a type of computer hacking.

Blurred answer
Students have asked these similar questions
What are some of the roles and responsibilities that a person who works in the area of cyber security is expected to take on?
Explain the phrase "cybersecurity" and why it is important.
To get started, what are some of the many varieties of cyber attacks and what are the hallmarks of a breach in cyber security?
Knowledge Booster
Background pattern image
Recommended textbooks for you
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Text book image
Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning
Text book image
CMPTR
Computer Science
ISBN:9781337681872
Author:PINARD
Publisher:Cengage