answersLogoWhite

0

considering 2 systems in communication, when a hacker enters into the scene, he want's data which is being transmitted. so, he first hijacks the session, so that the data sent by first system is transmitted to both the second system and hacker................

User Avatar

Wiki User

13y ago

What else can I help you with?

Related Questions

A passive threat to computer security is?

passive threat of a data or information processing system, a threat of disclosureof information without changing the state of the system.For example of a passive threat is one that could result in the recoveryof sensitive information through the unauthorized interception of a data transmission.


Which type of security threat involves capturing a cellular radio signal and listening to the conversation?

C: Interception


What is the inherent security risk associated with RF emissions?

The inherent security risk associated with RF emissions is eavesdropping or interception of the transmitted data. Attackers can use specialized equipment to capture and decode sensitive information being transmitted wirelessly, compromising the confidentiality of the data. Proper encryption and security protocols can mitigate this risk.


How can microchips be used to breach the confidentiality of medical records?

Microchips when handled without the greatest degree of security can breach the confidentiality of medical records and any other records. Microchips store so much information that interception of them can have devastating consequences.


What is the suffix for interception?

The suffix for interception is -ion.


After an interception there are offsetting penalties Does the interception count?

Yes, the interception will count. The key is that the penalties happened after the change of possession.


How do use interception in a sentence?

That was a great interception by Zdeno Chara.


When was Cosmic Interception created?

Cosmic Interception was created in 1994.


What is the duration of A Timely Interception?

The duration of A Timely Interception is 1020.0 seconds.


What are the risks and security measures associated with sending checks through email?

Sending checks through email poses risks such as interception by hackers, unauthorized access, and potential fraud. Security measures to mitigate these risks include using encrypted email services, password protection, and avoiding sending sensitive information via email whenever possible.


What is encrypted page that contains some unencrypted information?

An encrypted page that contains some unencrypted information refers to a webpage that uses a secure connection (https) to encrypt most of its content to protect it from being intercepted by unauthorized parties, but may still have certain elements that are not encrypted, such as images or scripts. This can pose a security risk as the unencrypted information could be vulnerable to interception or manipulation by attackers. It is important to ensure that all elements on a webpage are encrypted to maintain privacy and security.


What information security policy outlines the implementation of a security program within the organization?

General - General Security Policy is also known as the Enterprise Information Security Policy, organizational security policy, IT security policy or information security policy.