Man-in-the-middle attack an attacker interposes during key


Consider the following threats to Web security and describe (in detail) how each is countered by a particular feature of SSL:

a. Brute-Force Cryptanalytic Attack: An exhaustive search of the key space for a conventional encryption algorithm.

b. Replay Attack: Earlier SSL handshake messages are replayed.

c. Man-in-the-Middle Attack: An attacker interposes during key exchange, acting as the client to the server and as the server to the client.

d. Password Sniffing: Passwords in HTTP or other application traffic are eavesdropped.

e. IP Spoofing: Uses forged IP addresses to fool a host into accepting bogus data.

f. IP Hijacking: An active, authenticated connection between two hosts is disrupted and the attacker takes the place of one of the hosts.

g. SYN Flooding:An attacker sends TCP SYN messages to request a connection but does not respond to the final message to establish the connection fully. The attacked TCP module typically leaves the "half-open".

Solution Preview :

Prepared by a verified Expert
Dissertation: Man-in-the-middle attack an attacker interposes during key
Reference No:- TGS02520299

Now Priced at $10 (50% Discount)

Recommended (97%)

Rated (4.9/5)