Essays about: "Man-In-The-Middle"

Showing result 21 - 22 of 22 essays containing the word Man-In-The-Middle.

  1. 21. Campus Network Design and Man-In-The-Middle Attack

    University essay from Högskolan i Halmstad/Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE)

    Author : Mahmood Nazari; Kun Zhou; [2014]
    Keywords : SSL; Man-In-The-Middle; MITM; ARP Poisoning;

    Abstract : Security is at the front line of most networks, and most companies apply an exclusive security policy enclosing many of the Open Systems Interconnection (OSI) layers, from application layer all the way down to Internet Protocol (IP) security. On the other hand, an area that is often not protected with high level of security is the second layer of OSI model and this can compromise the entire network to a diversity of attacks. READ MORE

  2. 22. Data Encryption on a Network

    University essay from Institutionen för datavetenskap, fysik och matematik, DFM

    Author : Jorge Luque González; Ignacio Arenchaga Fernandez; [2010]
    Keywords : encryption; decryption; DES; Triple-DES; security; serpent; blowfish; Diffie-Hellman; RSA; AES; private key; public key; security; attack; brute force; man-in-the-middle.; encriptacion; decriptacion; DES; Triple-DES; seguridad; serpent; blowfish; Diffie-Hellman; RSA; AES; clave privada; clave pública; ataque; fuerza bruta; man-in-the-middle;

    Abstract : In this project you can find a study about different encryption algorithms, which are use to safeguard the information on messages over the network. We have developed a client-server application which will send information through the network which has to be secured. READ MORE