Question

In: Computer Science

A close friend of yours watched a few episodes of a cybersecurity TV show and has...

A close friend of yours watched a few episodes of a cybersecurity TV show and has become the resident expert on all things cybersecurity-related. They point out that you should never use public Wi-Fi as all traffic sent over the Wi-Fi network can be viewed by an attacker.

1) Do you agree with their assessment?

2) Which protocol sends data in cleartext? Which sends it encrypted?

3) What would happen if an attacker tries to passively view TLS encrypted traffic?

4) What would happen if an attacker actively tried to intercept TLS encrypted traffic. What is this attack called?

Solutions

Expert Solution

1.)
Yes, I agree with the assessment as below are the risk in a public wifi:
- Might be spoofed. Means your network requests can be transferred to a different website where the data you have provided can be compromised.
- Generally, most people use same password across multiple sites over the internet. If you sign in to a public wifi, it might be so possible that someone is having a silent look at your sign in details and steals your password to get hold of many other websites.

2.)
FTP -> File transfer protocol.
SNMP -> Simple netwrok management protocol
The above two establishes connection with other machines by sending plain text data i.e. without encryption

HTTPS -> Hyper Text Transfer Protocol Secure
SSL -> Secure Sockets Layer.
The above two encrypts the data and then sends in a network.


3.)

In case, the attacker is passively viewing the TLS packets, IP spoofing attack can happen. In this type of attack, when a user tries to access a web URL, the information that the user sends to that URL is redirected to the attackers defined address (may be his URL or website). From this, he can get hold of my data as my request never reached the actual URL but went to SPOOFED URL.

4.)
In case, the attacker is actively viewing the TLS packets, he can listen or view the information being sent from my system to the URL where I am making some request.

ME ----------------> Server -> This has
Server ---------------> ME no issues


In case of active viewing or eavesdropping (secretly viewing):-

ME --------------> Attacker ----------------->SERVER (Before going to actual destination, the request is intercepted by the attacker) MAN IN THE MIDDLE ATTACK







Kindly upvote if this helped


Related Solutions

You are watching TV with a friend of yours, who was not lucky enough to go...
You are watching TV with a friend of yours, who was not lucky enough to go to business school and take a course on marketing research. On TV, a journalist explains that, according to the latest poll, “pollsters are confident at 95% that 64% (+ or – 3%) of the French voters would vote for Mr. Biden and 36% (+ or – 3%) for Mr. Trump, if the presidential elections were held today”. The journalist adds that those results are...
The mother of a close friend of yours is diagnosed with moderate osteoporosis. She is prescribed...
The mother of a close friend of yours is diagnosed with moderate osteoporosis. She is prescribed two hormones, or supplements, or drugs that affect hormones or supplements. 1.) Tell me two possibilities for these medications, and describe how they would help her osteoporosis. Note: I don’t expect you to know any drug names, I’m asking you for what TYPES of drugs. 2.) The mother of your close friend is also told to exercise. Why? Although many types of exercise are...
Tina, a close friend of yours has a three year old daughter who is embarrassing her...
Tina, a close friend of yours has a three year old daughter who is embarrassing her in public by crying because she wants her mom to buy her a particular toy or candy whenever they go out shopping. Tina often decides to stop this crying by buying the toy or candy for the child. Q.4.1 Using your knowledge of operant conditioning and reinforcement, define and explain the basic principles of operant conditioning in relation to the scenario above. (10) Q.4.2...
a. Define worms and spyware b. Do you think that if a close friend of yours...
a. Define worms and spyware b. Do you think that if a close friend of yours posts a photo with you on Facebook, that may compromise your privacy? Why or why not? c. Why would you want to keep your cookies? And why would you want to delete it?
A friend of yours is analyzing an investment in a small peach orchard. He has estimated...
A friend of yours is analyzing an investment in a small peach orchard. He has estimated that the orchard will require an initial expenditure of $25,000 to prepare the soil, buy and plant the trees, and install new irrigation equipment. The trees won’t produce for the first 2 years, and will produce at only 1/2 and 3/4 of full production in years 3 and 4, respectively. Your friend estimates his net income will be negative in the first couple of...
A friend of yours is fascinated by marine snails and keeps them as pets. He has...
A friend of yours is fascinated by marine snails and keeps them as pets. He has two pet snail-like shelled organisms that he keeps in separate water filled tanks. Both of theseorganisms are of the same species, so the only difference between them is the tanks they are in. Let's label the tanks as Tank A and Tank B. Your friend is lazy and only checks the water conditions and pH levels of Tank A. Your friend assumes if Tank...
A friend of yours is fascinated by marine snails and keeps them as pets. He has...
A friend of yours is fascinated by marine snails and keeps them as pets. He has two pet snail-like shelled organisms that he keeps in separate water filled tanks. Both of theseorganisms are of the same species, so the only difference between them is the tanks they are in. Let's label the tanks as Tank A and Tank B. Your friend is lazy and only checks the water conditions and pH levels of Tank A. Your friend assumes if Tank...
A friend of yours is interested in a career in coding. He has some health care...
A friend of yours is interested in a career in coding. He has some health care experience working as a medical office assistant at a local orthopedist clinic. He also has an associate’s degree in computer sciences and needs to make a career change. He looks to you, a successful coding student, for advice. 1. What would you tell your friend about coding? 2. What information would you give him to help him decide if this profession is for him?...
A friend of yours is analyzing an investment in a small peach orchard. He has estimated...
A friend of yours is analyzing an investment in a small peach orchard. He has estimated that the orchard will require an initial expenditure of $25,000 to prepare the soil, buy and plant the trees, and install new irrigation equipment. The trees won’t produce for the first 2 years, and will produce at only 1/2 and 3/4 of full production in years 3 and 4, respectively. Your friend estimates his net income will be negative in the first couple of...
A friend of yours has asked for your assistance in determining the gross profit for her...
A friend of yours has asked for your assistance in determining the gross profit for her new promotions company that distributes branded refillable water bottles to her only client. The agreed upon selling price to her customer for the entire year was $5.00 per unit. Her beginning and ending inventory were 500 units and there was no inventory shrinkage or returns. Assume the starting inventory cost per unit was $2.00. She uses a periodic inventory method. Her purchases were as...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT