Choose ONE (1) method of threat:(IP spoofing)
- Describe the method of threat.
IP spoofing is a technique used to gain unauthorized access to machine,whereby an attacker illicitly impersonates another machine by manipulating IP packets.
- How it works?
The data transmitted over the internet is first broken into multiple packets, and those packets are transmitted independently and reassembled at the end.
Each packet has an IP (Internet Protocol) header that contains information about the packet, including the source IP address and the destination IP address.
- Example
- Stay secure when using the web
- Install a spoofing detector
References:
No comments:
Post a Comment