This topic is very interesting in terms of basic cybersecurity.
We all know that data has to be travelled from source to destination, In this process, many hackers don't sit idle, they try to tamper our data, this attack is known as "man-in-the-middle attack".
Now, Hacker does either of these 2 things-
→Eavesdropping
→Alteration
What is Eavesdropping?
Hacker just listens or sees the information without changing the data from source to destination.
What is Alteration?
This is the dangerous thing hacker can do in a man-in-the-middle attack. Hacker alters (changes) the data which is going from source to destination.
The mechanism for Eve's dropping and Alteration will be posted soon.
Comments
Post a Comment