Consider the following threats to Web security and describe how each is countered by a particular feature of TLS. A. Password Sniffing: Passwords in HTTP or other application traffic are eavesdropped. B. IP Spoofing: Uses forged IP addresses to fool a host into accepting bogus data. C. IP Hijacking: An active, authenticated connection between two hosts is disrupted, and the attacker takes the place of one of the hosts. D. SYN Flooding: An attacker sends TCP SYN messages to request a connection, but does not respond to the final message to establish the connection fully. The attacked TCP module typically leaves the “half-open connection” around for a few minutes. Repeated SYN messages can clog the TCP module.
Consider the following threats to Web security and describe how each is countered by a particular feature of TLS.
A. Password Sniffing: Passwords in HTTP or other application traffic are eavesdropped.
B. IP Spoofing: Uses forged IP addresses to fool a host into accepting bogus data.
C. IP Hijacking: An active, authenticated connection between two hosts is disrupted, and the attacker takes the place of one of the hosts.
D. SYN Flooding: An attacker sends TCP SYN messages to request a connection, but does not respond to the final message to establish the connection fully. The attacked TCP module typically leaves the “half-open connection” around for a few minutes. Repeated SYN messages can clog the TCP module.
Trending now
This is a popular solution!
Step by step
Solved in 3 steps