Premium Essay

Nt1310 Unit 3 Assignment 1 Mim Attack

Submitted By
Words 445
Pages 2
In the previous posts, the various attacks like Denial of service attack, different types of intrusions which have serious impact on the network are discussed. In this post there is one more attack called Man in the middle attack and the steps to prevent the network from these attacks with the methods like Virtual Private Network (VPN), firewalls and Secure Socket Layer (SSL) will be discussed here. MIM attack is more common on the network which is client server architecture. The attacker stays in between the source and the destination without showing the attackers presence. When the client wants to send the information to the server, the hackers pulls all the information while the data is on the way to the server. This attack is more common on the networks which uses the no encryption techniques because the message will be transmitted in the plain text which is readable by human. The only way to minimize this attack is using good encryption technique. …show more content…
Organizations use Virtual private network to unite remote datacenters, and people can utilize VPN’s to get access to network resources when they're not physically on the same local area network. Simply it is a technique for securing and encoding their communications when they're utilizing an untrusted open network. When connection is established with a VPN, typically a VPN client will pop up on machine asking for the log credentials and then the computer exchanges the trusted keys with the server .Once both computers have confirmed one another as legitimate, the majority of the web communication is encrypted and secured from

Similar Documents