{"id":1744,"date":"2021-09-29T17:22:42","date_gmt":"2021-09-29T15:22:42","guid":{"rendered":"https:\/\/dev.nameshield.com\/en\/?page_id=1744"},"modified":"2024-11-15T09:36:53","modified_gmt":"2024-11-15T08:36:53","slug":"data-espionage","status":"publish","type":"page","link":"https:\/\/www.nameshield.com\/en\/glossary\/data-espionage\/","title":{"rendered":"Data espionage"},"content":{"rendered":"\n<div class=\"wp-block-cover alignfull is-light eplus-Miu96y eplus-wrapper\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-100 has-background-dim has-background-gradient\" style=\"background:linear-gradient(135deg,rgb(21,115,191) 0%,rgb(255,0,0) 100%)\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer eplus-k46Hvb eplus-wrapper\"><\/div>\n\n\n\n<div class=\"wp-block-columns eplus-Gmb77s eplus-wrapper is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-bottom eplus-t1q6kX eplus-wrapper is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p class=\"eplus-P8Abfm eplus-wrapper has-nv-text-dark-bg-color has-text-color\"><strong>To effec\u00adtive\u00adly fight against <em>data espi\u00adonage<\/em> and inter\u00adcep\u00adtion, SSL\/TLS cer\u00adtifi\u00adcates are the solu\u00adtion because they make it impos\u00adsi\u00adble to hack the infor\u00adma\u00adtion exchanged between the serv\u00ader and the brows\u00ader.<\/strong><\/p>\n\n\n\n<p class=\"eplus-QV5D1W eplus-wrapper has-nv-text-dark-bg-color has-text-color\">An SSL (Secure Sock\u00adet Lay\u00ader) or TLS (Trans\u00adport Lay\u00ader Secu\u00adri\u00adty) cer\u00adtifi\u00adcate is a dig\u00adi\u00adtal cer\u00adtifi\u00adcate that authen\u00adti\u00adcates a serv\u00ader (most often a web serv\u00ader) and encrypts the data exchanged with it. The data is thus exchanged in con\u00adfi\u00addence, between two actors whose iden\u00adti\u00adty is known. The data exchanged can\u00adnot be spied on or altered by a third par\u00adty: con\u00adfi\u00adden\u00adtial\u00adi\u00adty and integri\u00adty.<\/p>\n\n\n\n<p class=\"eplus-a74m83 eplus-wrapper has-nv-text-dark-bg-color has-text-color\">SSL\/TLS cer\u00adtifi\u00adcates allow to switch to HTTPS when brows\u00ading the Web. They work on the prin\u00adci\u00adple of asym\u00admet\u00adric encryp\u00adtion using cryp\u00adto\u00adgraph\u00adic keys. The SSL\/TLS pro\u00adto\u00adcol acti\u00advates a secure ses\u00adsion between a brows\u00ader and the web serv\u00ader that hosts the SSL cer\u00adtifi\u00adcate.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column eplus-X2eudu eplus-wrapper is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<figure class=\"wp-block-image size-full eplus-PvcNrd eplus-wrapper\"><img decoding=\"async\" src=\"https:\/\/nameshield.com\/wp-content\/uploads\/2021\/05\/Hacker-bro-red-Storyset-1.png\" alt=\"Data espionage - Nameshield\" class=\"wp-image-4573\"><\/figure>\n<\/div>\n<\/div>\n\n\n\n<p class=\"eplus-dl0xD8 eplus-wrapper has-nv-light-bg-color has-text-color has-link-color wp-elements-74a9ceccd72f553e9c415d66a0e094e8\">For a brows\u00ader to trust an SSL cer\u00adtifi\u00adcate, it must be issued by a trust\u00aded third par\u00adty: the Cer\u00adti\u00adfi\u00adca\u00adtion Author\u00adi\u00adty, fol\u00adlow\u00ading the rules defined by a reg\u00adu\u00adla\u00adto\u00adry body, the CA\/B forum. In addi\u00adtion, the cer\u00adtifi\u00adcate must be cor\u00adrect\u00adly installed and must con\u00adtain the domain name of the vis\u00adit\u00aded web\u00adsite. With\u00adout these pre\u00adreq\u00adui\u00adsites, the web user receives a secu\u00adri\u00adty alert when the page is dis\u00adplayed, which is pro\u00adhib\u00adi\u00adtive.. <\/p>\n\n\n\n<div style=\"height:41px\" aria-hidden=\"true\" class=\"wp-block-spacer eplus-2CSRTS eplus-wrapper\"><\/div>\n\n\n\n<div class=\"wp-block-buttons eplus-MPaiyQ eplus-wrapper is-horizontal is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-499968f5 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-primary eplus-fNJNPd eplus-wrapper\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.nameshield.com\/en\/cybersecurity\/ssl-certificates\/\">Find out about our  SSL\/TLS cer\u00adtifi\u00adcates<\/a><\/div>\n<\/div>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer eplus-Hw311g eplus-wrapper\"><\/div>\n<\/div><\/div>\n\n\n\n<div style=\"height:60px\" aria-hidden=\"true\" class=\"wp-block-spacer eplus-xTIB9i eplus-wrapper\"><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":861,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"wp_typography_post_enhancements_disabled":false,"editor_plus_copied_stylings":"{}","_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"neve_meta_sidebar":"full-width","neve_meta_container":"","neve_meta_enable_content_width":"on","neve_meta_content_width":100,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","footnotes":""},"class_list":["post-1744","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Data espionage - What is this attack and how to fight against it<\/title>\n<meta name=\"description\" content=\"What\u2019s a data espionage attack? How to protect against these attacks? Find all the solutions on the Nameshield&#039;s website.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.nameshield.com\/en\/glossary\/data-espionage\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data espionage - What is this attack and how to fight against it\" \/>\n<meta property=\"og:description\" content=\"What\u2019s a data espionage attack? How to protect against these attacks? Find all the solutions on the Nameshield&#039;s website.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.nameshield.com\/en\/glossary\/data-espionage\/\" \/>\n<meta property=\"og:site_name\" content=\"Nameshield\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-15T08:36:53+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.nameshield.com\\\/en\\\/glossary\\\/data-espionage\\\/\",\"url\":\"https:\\\/\\\/www.nameshield.com\\\/en\\\/glossary\\\/data-espionage\\\/\",\"name\":\"Data espionage - What is this attack and how to fight against it\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.nameshield.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.nameshield.com\\\/en\\\/glossary\\\/data-espionage\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.nameshield.com\\\/en\\\/glossary\\\/data-espionage\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nameshield.com\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/Hacker-bro-red-Storyset-1.png\",\"datePublished\":\"2021-09-29T15:22:42+00:00\",\"dateModified\":\"2024-11-15T08:36:53+00:00\",\"description\":\"What\u2019s a data espionage attack? How to protect against these attacks? Find all the solutions on the Nameshield's website.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.nameshield.com\\\/en\\\/glossary\\\/data-espionage\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.nameshield.com\\\/en\\\/glossary\\\/data-espionage\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.nameshield.com\\\/en\\\/glossary\\\/data-espionage\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nameshield.com\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/Hacker-bro-red-Storyset-1.png\",\"contentUrl\":\"https:\\\/\\\/nameshield.com\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/Hacker-bro-red-Storyset-1.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.nameshield.com\\\/en\\\/glossary\\\/data-espionage\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Glossary\",\"item\":\"https:\\\/\\\/www.nameshield.com\\\/en\\\/glossary\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data espionage\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.nameshield.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.nameshield.com\\\/en\\\/\",\"name\":\"Nameshield\",\"description\":\"Online Assets Security\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.nameshield.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Data espionage - What is this attack and how to fight against it","description":"What\u2019s a data espionage attack? How to protect against these attacks? Find all the solutions on the Nameshield's website.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.nameshield.com\/en\/glossary\/data-espionage\/","og_locale":"en_US","og_type":"article","og_title":"Data espionage - What is this attack and how to fight against it","og_description":"What\u2019s a data espionage attack? How to protect against these attacks? Find all the solutions on the Nameshield's website.","og_url":"https:\/\/www.nameshield.com\/en\/glossary\/data-espionage\/","og_site_name":"Nameshield","article_modified_time":"2024-11-15T08:36:53+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.nameshield.com\/en\/glossary\/data-espionage\/","url":"https:\/\/www.nameshield.com\/en\/glossary\/data-espionage\/","name":"Data espionage - What is this attack and how to fight against it","isPartOf":{"@id":"https:\/\/www.nameshield.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.nameshield.com\/en\/glossary\/data-espionage\/#primaryimage"},"image":{"@id":"https:\/\/www.nameshield.com\/en\/glossary\/data-espionage\/#primaryimage"},"thumbnailUrl":"https:\/\/nameshield.com\/wp-content\/uploads\/2021\/05\/Hacker-bro-red-Storyset-1.png","datePublished":"2021-09-29T15:22:42+00:00","dateModified":"2024-11-15T08:36:53+00:00","description":"What\u2019s a data espionage attack? How to protect against these attacks? Find all the solutions on the Nameshield's website.","breadcrumb":{"@id":"https:\/\/www.nameshield.com\/en\/glossary\/data-espionage\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.nameshield.com\/en\/glossary\/data-espionage\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nameshield.com\/en\/glossary\/data-espionage\/#primaryimage","url":"https:\/\/nameshield.com\/wp-content\/uploads\/2021\/05\/Hacker-bro-red-Storyset-1.png","contentUrl":"https:\/\/nameshield.com\/wp-content\/uploads\/2021\/05\/Hacker-bro-red-Storyset-1.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.nameshield.com\/en\/glossary\/data-espionage\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Glossary","item":"https:\/\/www.nameshield.com\/en\/glossary\/"},{"@type":"ListItem","position":2,"name":"Data espionage"}]},{"@type":"WebSite","@id":"https:\/\/www.nameshield.com\/en\/#website","url":"https:\/\/www.nameshield.com\/en\/","name":"Nameshield","description":"Online Assets Security","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.nameshield.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.nameshield.com\/en\/wp-json\/wp\/v2\/pages\/1744","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nameshield.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.nameshield.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.nameshield.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nameshield.com\/en\/wp-json\/wp\/v2\/comments?post=1744"}],"version-history":[{"count":8,"href":"https:\/\/www.nameshield.com\/en\/wp-json\/wp\/v2\/pages\/1744\/revisions"}],"predecessor-version":[{"id":2471,"href":"https:\/\/www.nameshield.com\/en\/wp-json\/wp\/v2\/pages\/1744\/revisions\/2471"}],"up":[{"embeddable":true,"href":"https:\/\/www.nameshield.com\/en\/wp-json\/wp\/v2\/pages\/861"}],"wp:attachment":[{"href":"https:\/\/www.nameshield.com\/en\/wp-json\/wp\/v2\/media?parent=1744"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}