A Man In The Middle Attack Computer Science Essay
http://buy-essay-online72.mystrikingly.com
Today computer networks are used to transmit large amounts of data which may or may not contain sensitive information. Within this document I will be discussing ways in which your networks may become venerable to attacks. Man in the middle attacks, spanning tree attacks, security issues related to trunking, and security issues relating to identity spoofing. What is a Man in the middle attack? Man in the middle attack is a name given to a type of attack where the person intercepts communication being sent across a data network. This type of attack is also known as a Bucket-brigade attack, Fire brigade attack, Monkey-in-the-middle attack, Session hijacking, TCP hijacking, TCP session hijacking etc. Man in the middle attack is an attack that is usually performed on a internal network. Man in the middle attacks are where hackers introduce a rouge device onto the network then intercept communication between two network devices.