BISY3006/ISY2003/ISY203 Information Security @ Australian Institute of Higher Education, Sydney Tutorial #3 Total Marks: 30 (6%) Submit your answers to the following questions by Week-7 Friday 5:00PM....

1 answer below »

View more »
Answered 5 days AfterMay 03, 2021UNIT 5

Answer To: BISY3006/ISY2003/ISY203 Information Security @ Australian Institute of Higher Education, Sydney...

Ali Asgar answered on May 08 2021
145 Votes
Q#1. Man-in-the-middle attack
A Man-in-the-middle Attack or MitM Attack is type of cyber security attack that is used to either monitor a legitimate traffic to steal credentials
or to impersonate someone and make a fraud transaction with another party. In this type of attack, the attacker intercepts the connection between two legitimate users Alice and Bob and communicate with them as if they are communicating with each other.
In this, the attacker may simply eavesdrop the connection and capture login credentials, payment information or similar confidential information that can either be sold or used maliciously at a later stage.
In another form, the attacker impersonates the legitimate users for both ends and the attacker appears to Alice as Bob and to Bob as Alice. Alice thinks he is communicating with Bob, and Bob replies as if he is talking to Alice. The attacker here may modify whole or part of data as per his requirements.
The Image shared shows that
· when Bob asks Alice for her public key, that communication is forwarded to Alice uninterrupted.
· Alice replies to Bob’s request with her public key, which is intercepted by Attacker.
· The attacker stores Alice’s public key with itself, and shares his own public key with Bob.
· Since Bob had requested Alice, he thinks this reply is from Alice and thus stores Attacker’s public key as Alice’s Public Key.
· Now, Bob initiates an encrypted communication with Alice, but uses Attacker’s key for encryption.
· The attacker intercepts this message and reads the message. Here Bob has sent his account number.
· The attacker then sends his own account number to Alice using her public key for encryption.
· Thus, Alice thinks the Attacker’s account number is actually Bob’s account number.
Both Bob and...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here
April
January
February
March
April
May
June
July
August
September
October
November
December
2025
2025
2026
2027
SunMonTueWedThuFriSat
30
31
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
1
2
3
00:00
00:30
01:00
01:30
02:00
02:30
03:00
03:30
04:00
04:30
05:00
05:30
06:00
06:30
07:00
07:30
08:00
08:30
09:00
09:30
10:00
10:30
11:00
11:30
12:00
12:30
13:00
13:30
14:00
14:30
15:00
15:30
16:00
16:30
17:00
17:30
18:00
18:30
19:00
19:30
20:00
20:30
21:00
21:30
22:00
22:30
23:00
23:30