What is Unauthorised Modification? How to avoid this?
A
Data has been changed without permission by unauthorised users.
Assigning permission to users can ensure that only certain users can access and make necessary modifications.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
What is Impersonation Attack? How to prevent this?
A
Where the individual trying to access sensitive information or system is pretending to be an authorised user.
Educating users and adhering to anti-social engineering practices.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
What is the MITM attack and Replay attacks? How can they be avoided?
A
Man in the middle attack is when an hacker has interecpeted communication between two hosts, and alters communications send between users without them realising or passively listen.
A replay attack involves capturing a valid response or data exchanged between two parties (such as a client and a server) and then maliciously reusing that same response or data later on to access a computer system or network.
Using encryption such as Transport Layer Security protocols when communicating between hosts can prevent two attacks.