Question

In: Computer Science

INTERNET OF THINGS (IOT) 28. Hackers have employed ‘Man in the Middle Attack (MITM)’ on your...

INTERNET OF THINGS (IOT)

28. Hackers have employed ‘Man in the Middle Attack (MITM)’ on your IT infrastrucutre. How would you explain (with a suitable diagram) this type of attack to your apprentice who has just started working for you?

Solutions

Expert Solution

MITM is a kind of cyber-attack where the attacker positions himself in a conversation between a user and an application. One example of a MITM attack is active eavesdropping. In active eavesdropping, the attacker makes independent connections with the victims and relays messages between them. It makes the receiver believe that they are talking directly to each other over a private connection. But actually, the attacker is controlling the entire conversation.

The goal of an attack is to steal personal information, such as login credentials, account details, and credit card numbers. And this stolen personal information could be used for identity theft, unapproved fund transfers, and so on.

Example:

Suppose Alice wishes to communicate with Bob. Meanwhile, Eve wishes to intercept the conversation.

1. Alice asks Bob for his public key.

2. Bob sends his public key to Alice

3. Eve intercept it, a MITM attack can begin.

4. Eve sends Alice a forged message that appears to originate from Bob, by including Eve's public key.

5. Alice, believing this public key to be Bob's and encrypts the received message with Eve's key

6. Alice sends the enciphered message back to Bob.

7. Eve again intercepts, deciphers the message using her private key, possibly alters it if she wants,

8. Re-enciphers it using the public key she intercepted from Bob when he originally tried to send it to Alice.

9. Bob receives the newly enciphered message, he believes it came from Alice.

This is the flow of Man in the middle attack

UPVOTE PLS...


Related Solutions

Mischievous hackers have employed ‘Theft of Service Attack’ on your IT infrastructure. How would you explain...
Mischievous hackers have employed ‘Theft of Service Attack’ on your IT infrastructure. How would you explain (with a suitable diagram) this type of attack to your apprentice who has just started working for you?
Explain the differences between a replay attack and a Man-in-the-middle attack.
Explain the differences between a replay attack and a Man-in-the-middle attack.
WHAT ARE THE ADVANTAGES AND DISADVANTAGES OF INTERNET OF THINGS (IOT) IN AN ORGANIZATION
WHAT ARE THE ADVANTAGES AND DISADVANTAGES OF INTERNET OF THINGS (IOT) IN AN ORGANIZATION
INTERNET OF THINGS (IOT) 27. You have been invited by a reputed IT magazine to write...
INTERNET OF THINGS (IOT) 27. You have been invited by a reputed IT magazine to write an article that would present three key differences that distinguish fog devices from cloud servers. Describe the three differences.
INTERNET OF THINGS (IOT) 26. After several years of IoT experience as an engineer, you conclude...
INTERNET OF THINGS (IOT) 26. After several years of IoT experience as an engineer, you conclude that IoT solutions are more complex to govern than traditional networks. Defend your opinion to your supervisor with at least five reasons/factors.
INTERNET OF THINGS (IOT) 25. Some argue that Arduino is preferable low power IoT device to...
INTERNET OF THINGS (IOT) 25. Some argue that Arduino is preferable low power IoT device to Raspberry Pi for small scale home projects. Would you agree or disagree? Differentiate between them based on at least three features (i.e. that makes one preferable than the other for a small scale home project.)
Provide five examples of how the Internet of Things (IoT) will influence your career practicing mechanical...
Provide five examples of how the Internet of Things (IoT) will influence your career practicing mechanical engineering o Explain (in detail and with examples) how life and society will benefit from this evolution
Q1. What is Internet of Things (IoT)? Can you describe one IoT application you know of...
Q1. What is Internet of Things (IoT)? Can you describe one IoT application you know of and explain the techniques behind such IoT application? Q2. Now you might have known some advantages of IoT but what about disadvantages? What are the possible issues of IoT and why? Please reference the information
Identify and assess 3 challenges associated with the implementation of IoT ( Internet of Things )...
Identify and assess 3 challenges associated with the implementation of IoT ( Internet of Things ) within the manufacturing system.
Summarise 3 benefits for manufacturers from adopting the IoT ( Internet of Things ).
Summarise 3 benefits for manufacturers from adopting the IoT ( Internet of Things ).
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT