Changes

Jump to: navigation, search

An Overview of IT Security Threats and Attacks

1 byte removed, 19:33, 14 February 2008
Mathematical Attacked
TCP/IP Hijacking is occurs when an attacker takes control of an ongoing session between a client and a server. This is similar in to a man-in-the-middle attack except that the rogue agent sends a reset request to the client so that the client loses contact with the server while the rogue system assumes the role of the legitimate client, continuing the session.
== Mathematical Attacked Attacks ==
The solution to a number of the types of attack outlined above has involved the use of encryption. A mathematical attack involves the use of computation based on the mathematical properties of the encryption algorithm to attempt to decrypt data.

Navigation menu