Describe how session hijacking works and how it is prevented.

What will be an ideal response?


A TCP hijacker observes the sequence of numbers sent in a TCP conversation, and then uses an expected sequence number to impersonate one of the session participants. To prevent the impersonated party from continuing to take part in the conversation, the hijacker stages a DoS attack on the network session. Using an authentication method that isn't based only on IP addresses is one solution for preventing session hijacking.

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. Software refers to the people who work with computer hardware. 2. Visual Basic uses a graphical user interface. 3. Visual Basic uses a zero-based numbering system. 4. In most cases, a well-written program need not be tested. 5. The analysis and design steps of program planning are largely independent of the particular computer language the programmer is using.

Computer Science & Information Technology

Which of the following arrangements are valid for a group of dt and dd elements within a dl?

a. A single dt grouped with a single dd. b. A single dt grouped with multiple dd elements. c. Multiple dt elements grouped with a single dd. d. Multiple dt elements grouped with multiple dd elements. e. All of the above. f. None of the above.

Computer Science & Information Technology

The escape character in JavaScript is ____.

A. \ B. / C. $ D. ^

Computer Science & Information Technology

Users began bringing their own PCs to work in the ______ to improve their _________.

A. 1960s; productivity B. 1960s; profitability C. 1970s; productivity D. 1970s; profitability

Computer Science & Information Technology