Threats to web security-man-in-the-middle attack

Assignment Help Other Subject
Reference no: EM13253953

Consider the following threats to Web security and describe how each is countered by

a particular feature of SSL.

a. Brute-Force Cryptanalytic Attack: An exhaustive search of the key space for a conventional encryption algorithm.

b. Known Plaintext Dictionary Attack: Many messages will contain predictable plaintext, such as the HTTP GET command. An attacker constructs a dictionary containing every possible encryption of the known-plaintext message.When an encrypted message is intercepted, the attacker takes the portion containing the encrypted known plaintext and looks up the ciphertext in the dictionary. The ciphertext should match against an entry that was encrypted with the same secret key. If there are several matches, each of these can be tried against the full ciphertext to determine the right one.This attack is especially effective against small key

sizes (e.g., 40-bit keys).

c. Replay Attack: Earlier SSL handshake messages are replayed.

d. Man-in-the-Middle Attack: An attacker interposes during key exchange, acting as the client to the server and as the server to the client.

e. Password Sniffing: Passwords in HTTP or other application traffic are eavesdropped.

f. IP Spoofing: Uses forged IP addresses to fool a host into accepting bogus data.

g. IP Hijacking: An active, authenticated connection between two hosts is disrupted and the attacker takes the place of one of the hosts.

h. SYN Flooding:An attacker sends TCP SYN messages to request a connection but does not respond to the final message to establish the connection fully. The attacked TCP module typically leaves the “half-open connection” around for a few minutes. Repeated SYN messages can clog the TCP module.

Reference no: EM13253953

Questions Cloud

How does he manage to overcome it-rehabilitate that ethos : At what point or points in this speech does Wiesel risk offending parts of his audience to the extent where it might hurt his ethos -- and how does he manage to overcome it and rehabilitate that ethos?
Project life cycle-initiation-planning-execution : Discuss the importance of maintaining a Lesson's Learned Document throughout  the project life cycle (from Initiation, Planning, Execution, Monitoring  & Controlling and Closing)
Christian sport organizations and christian athletes : List the ways that Christian sport organizations and Christian athletes have used sports, and list the ways that Christian athletes and coaches have used religion in their lives.
Christian athletes-religious beliefs and rituals : What are the reasons that athletes in North America and a few other countries combined their Christian beliefs with sport participation? Which reasons do you think are the most important and least important among the people you know who say they are ..
Threats to web security-man-in-the-middle attack : Brute-Force Cryptanalytic Attack: An exhaustive search of the key space for a conventional encryption algorithm. Man-in-the-Middle Attack: An attacker interposes during key exchange, acting as the client to the server and as the server to the client.
Maximum equilibrium solubility of hydrogen : The maximum equilibrium solubility of hydrogen at a partial pressure of 1 atm in liquid magnesium is 26 cm^3 per 100g.  This drops to 18cm^3 per 100g upon solidification.  The density of Mg (liquid and solid) is 1.74 g/cm^3.
A cylindrical casting : A cylindrical casting is 0.1 m in diameter and 0.5 m in length.  Another casting of the same material is elliptical in cross-sectiona, with the major axis twice the length of the minor axis, and has the same cross-sectional area and length as the cyl..
A very large iron plate of thickness 100 mm is cast : a very large iron plate of thickness 100 mm is cast by pouring iron at its melting temperature into a sadn mould, such that heat is withdrawn from both faces of the solidifying plate.  estimate by calculation the time for the plate to solidify if the..
Draw cells from two parents : Draw cells from two parents: one that is heterozygous at two unlinked loci (A and B) and another that is homozygous recessive at the first locus and homozygous dominant at the second.

Reviews

Write a Review

Other Subject Questions & Answers

  Standardized and non-standardized assessment

Please provide an example of one standardized and one non-standardized assessment instrument (be specific with your examples, including what makes each assessment standardized or non-standardized).

  Substantial stability coefficients

The substantial stability coefficients shown by most Rorschach variables could not have been achieved without good agreement among the persons who coded the protocols used in the retest studies.

  To prevent harmful contact in dangerous situations

Kate believes that George is about to hit her. To prevent harmful contact in dangerous situations, a person may use:

  Water-saturated soils

Unconsolidated, water-saturated soils or sediments provide good foundation materials for buildings and other structures

  Jetblue and the va. importance of it processes

Eric Brinker of JetBlue noted that the database developed during the crisis had not been needed before; the company had never experienced a meltdown. A small, undocumented change resulted in the collapse of the VA system, largely due to the high inte..

  Evaluating user & system requirements

Develop a Work Breakdown Structure (WBS) and project schedule in a Gantt format for an E-Mail Upgrade Project. Evaluate User & System Requirements.

  Reduced autonomic nervous system efficiency

Write down teh manifestations of reduced autonomic nervous system efficiency are seen in elderly individuals?

  Design to clearly communicates different ideas by typography

Use typography to make one design which clearly communicates four different ideas, words, or compound words through both text and graphic design.

  Would earthquakes of similar magnitudes

Would earthquakes of similar magnitudes in different regions of the Earth cause approximately the same levels of damage necessarily? In your explanation, consider both geologic and human-induced factors.

  Asthma and anemia affect routine measurements

How does the presence of asthma and anemia affect routine measurements and observations of each body system.

  What type of social influence situation

In what type of social influence situation do we follow direct commands from others?  forming, storming, norming, and performing

  Explain the counterterrorism strategies

Explain the counterterrorism strategies you think are most effective for combating Hezbollah, Hamas, and al-Qaeda. Explain why different strategies are necessary for combating each group, and explain why some strategies may work well for combating mo..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd