Autor: |
GLĂVAN, Dragoş, RĂCUCIU, Ciprian, MOINESCU, Radu, EFTIMIE, Sergiu |
Předmět: |
|
Zdroj: |
Scientific Bulletin 'Mircea cel Batran' Naval Academy; 2020, Vol. 23 Issue 1, p199-201, 3p |
Abstrakt: |
A "man-in-the-middle" (MITM) attack occurs when an external entity intercepts communication between two systems. This can happen for any form of online communication, such as e-mail, websites social networking and web browsing. Not only does it try to listen to your private conversations, but it also steals all the information from your devices. A man-inthe- middle attack is a procedure that allows the attacker to interpose between the user and the computer it communicates with, to read or modify that conversation. This procedure used to be very common before the massive switch to the HTTP-Secure protocol and continues to be encountered even today, although it is harder to do. the higher threat is the low detection rate. Users may not always know if the network they use is legitimate or if someone monitors traffic ul, whether it's an airport, a hotel or a neighborhood cafe. Our dependence on the Internet has caused us to use the same device for both personal and professional life, thus being automatically exposed to risks. Web-based applications are based on HTTPS protocol to ensure confidentiality and security in transactions ranging from home banking, e-commerce and e-procurement to sensitive data, such as career and identity information. Users trust this protocol to prevent unauthorized viewing of personal, financial and confidential information on the Web. [ABSTRACT FROM AUTHOR] |
Databáze: |
Complementary Index |
Externí odkaz: |
|