Waiting for answer This question has not been answered yet. You can hire a professional tutor to get the answer.

QUESTION

Compose a 500 words essay on Man in the middle and secrity in multichannel. Needs to be plagiarism free!Hence, the attacker makes two systems believe that they are communicating to one another while t

Compose a 500 words essay on Man in the middle and secrity in multichannel. Needs to be plagiarism free!

Hence, the attacker makes two systems believe that they are communicating to one another while the attacker controls and modifies the communicated messages. The attacker achieves this by splitting the original TCP connection into two new connections and acting as a proxy where it can read, insert, and modify the data in the intercepted communication. The man in the middle is unauthorized and attacks in real time. The attack can occur in two ways. It can occur where the attacker controls a router along the normal point of traffic communication between two communicating systems. It can also occur where the attacker is located on the same broadcast domain with one of the systems.&nbsp.The attacker uses several tools like packet creator, Ettercap, Cain e Abel and Dsniff that are efficient in LAN networks. The tools manifest Arp spoof capabilities that that permit interceptions. The man in the middle can attack and modify a HTTP because the HTTP traffic is unencrypted and contains no authentication. It can also attempt to intercept HTTPS traffic by using a custom certificate. The attacker uses proxy tools like Paros Prox and Proxy Fuzz to interact with HTTP protocol (OWASP, 2009, p.1). The man in the middle attack takes advantage of weak network communication protocols to convince a host to route the information through the attacker instead of through the normal router. However, the man in the middle attack is also affirmative in developing a step of a web application and in creating Web Vulnerability assessments.

Because of these attacks, the computer technological sector has derived various ways to secure to the communications in the systems in Multichannel and Multi-level Authentication security protocols. To ensure data integrity and originator authenticity between devices such as Personal Digital Assistants (PDAs) whose owners has no past

Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question