In: Computer Science
1.Consider a two-way communication between John and Jane in which both want to exchange messages privately over a network. A third party, Tom wants also wants to know what messages are being exchanged between John and Jane. Explain what specific type of cybersecurity attack describes Tom’s malicious intentions of intercepting the private exchanges between John and Jane and how it can be carried out without being detected
MITM i.e Man-in-the-Middle Attack which is also called as Monster-in-the-middle attack or Machine-in-the-middle attack will describe Tom’s malicious intentions of intercepting the private exchanges between John and Jane.
The process of intercepting the private messages between John and Jane is done without detection by the following: