Describe a man-in-the-middle attack.

What will be an ideal response?


In a man-in-the-middle attack, an attacker taps into communications between two systems, covertly intercepting traffic thought to be only between those systems, reading or in some cases even changing the data and then sending the data on. A classic man-in-the-middle attack would be a person using special software on a wireless network to make all the clients think his laptop is a WAP. He could then listen in on that wireless network, gathering up all the conversations and gaining access to passwords, shared keys, or other sensitive information. Man-in-the-middle attacks are commonly perpetrated using ARP poisoning.
 

Computer Science & Information Technology

You might also like to view...

Show how to construct a send-constrained channel from a receive-constrained channel, and vice versa. Hint: use a trusted node connected to the given channel.

What will be an ideal response?

Computer Science & Information Technology

The choices of how many levels of heading you want included, page number choices, and format of page numbers can be found in the ________ dialog box

Fill in the blank(s) with correct word

Computer Science & Information Technology

The stack container class provides the operation size to return the actual number of elements in the stack.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What device converts an analog signal to digital and a digital signal to analog?

A. multiplexer B. modulator C. modulator-demodulator D. demodulator

Computer Science & Information Technology