How you would protect your network from session hijacking


Problem

We are going to research and provide an outline of how we would go about hijacking a session using one of these top three tools: Firesheep, Ettercap or DroidSheep (or if you find another tool, you can use it instead)

Start with the how you chose your target, the OS system you would use to conduct this attack, and then research how you would use one of the tools above to conduct the hijacking session. DO NOT actually go through with this exercise. just write-down the steps-hence the reason it is called a "Tabletop Exercise!"

The final part of the project is for you to write how you would protect your network from session hijacking.

You'll need to conduct research online and you are welcome to use screenshots of what the command lines look like, what the packet analyzer is seeing when attacked and then any other pertinent information for session hijacking.

The response should include a reference list. Double-space, using Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.

Solution Preview :

Prepared by a verified Expert
Management Information Sys: How you would protect your network from session hijacking
Reference No:- TGS02099613

Now Priced at $15 (50% Discount)

Recommended (91%)

Rated (4.3/5)