Description
1.Post any new or the latest hacking techniques not discussed in the book and if you choose not to please review and post comments on one or more the hacking techniques below:
VLAN Hopping
ARP Poisoning
MAC Spoofing
Dynamic Host Resolution Protocol (DHCP) – Man-in-the-Middle (MITM) attack
BEAST (Browser Exploit Against SSL/TLS)
2. Compare and contrast Asymmetric Key Algorithm's: RSA, Diffie-Hellman, and Elliptic Curve vs Symmetric Key Algorithms: Triple DES, Twofish, RC(6), and AES then please discuss what is your personal preferred method of encryption and why?
3. Research and post only one VPN type or protocols such as OpenVPN,PPTP,IPSEC,SSL,MPPE,L2TP, and Ikev2 and please post your favorite VPN product or type and if you have not used one then please research a VPN product and post the product of your preference.
Explanation & Answer
please find the attached file and please feel free to ask incase of any question
Running Head: COMPUTER SECURITY
Your name
Instructor
Course
Date
COMPUTER SECURITY
ARP poisoning
The media access control address is changed by the attacker in this form of attack and
also attacks the Ethernet LAN by adding a fake or forged reply packet and ARP request after
changing the cache of the ARP in the targeted computer. With this, the hacker modifies into their
known MAC address from the layer Ethernet MAC address so as they can monitor it. Due to the
ARP replies being forged, instead of the target computer sending the frames to the original
computer they end up sending frames intentionally to the hackers’ computer. This compromises
the user’s privacy and data (Rhyu & Oh, 2017).
MAC spoofing
This is an attack whereby the network is sniffed by the intruder or MAC addresses that
are valid and an attempt is made to behave as one of the MAC addresses that are vali...
Review
Review
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Similar Content
Related Tags
I Cant Make This Up - Life Lessons
by Kevin Hart
Fences
by August Wilson
Treasure Island
by Robert Louis
Homo Deus
by Yuval Noah Harari
The Da Vinci Code
by Dan Brown
The Nightingale
by Kristin Hannah
Shattered - Inside Hillary Clintons Doomed Campaign
by Amie Parnes and Jonathan Allen
Unf*ck Yourself
by Gary John Bishop
Faust
by Johann Wolfgang von Goethe