answersLogoWhite

0

considering 2 systems in communication, when a hacker enters into the scene, he want's data which is being transmitted. so, he first hijacks the session, so that the data sent by first system is transmitted to both the second system and hacker................

User Avatar

Wiki User

13y ago

What else can I help you with?

Related Questions

A passive threat to computer security is?

passive threat of a data or information processing system, a threat of disclosureof information without changing the state of the system.For example of a passive threat is one that could result in the recoveryof sensitive information through the unauthorized interception of a data transmission.


Which type of security threat involves capturing a cellular radio signal and listening to the conversation?

C: Interception


What is the inherent security risk associated with RF emissions?

The inherent security risk associated with RF emissions is eavesdropping or interception of the transmitted data. Attackers can use specialized equipment to capture and decode sensitive information being transmitted wirelessly, compromising the confidentiality of the data. Proper encryption and security protocols can mitigate this risk.


How can microchips be used to breach the confidentiality of medical records?

Microchips when handled without the greatest degree of security can breach the confidentiality of medical records and any other records. Microchips store so much information that interception of them can have devastating consequences.


Is Fax communications are safe from interception by radiotelephone sensors?

Fax communications can be vulnerable to interception, including by radiotelephone sensors, especially if they are transmitted over unsecured lines. While traditional fax machines use telephone lines that are relatively secure, digital faxing over the internet can expose data to interception if proper encryption and security measures are not in place. Therefore, without adequate safeguards, fax communications are not entirely safe from interception.


What is the suffix for interception?

The suffix for interception is -ion.


After an interception there are offsetting penalties Does the interception count?

Yes, the interception will count. The key is that the penalties happened after the change of possession.


When was Cosmic Interception created?

Cosmic Interception was created in 1994.


How do use interception in a sentence?

That was a great interception by Zdeno Chara.


What is the duration of A Timely Interception?

The duration of A Timely Interception is 1020.0 seconds.


What are the risks and security measures associated with sending checks through email?

Sending checks through email poses risks such as interception by hackers, unauthorized access, and potential fraud. Security measures to mitigate these risks include using encrypted email services, password protection, and avoiding sending sensitive information via email whenever possible.


What is encrypted page that contains some unencrypted information?

An encrypted page that contains some unencrypted information refers to a webpage that uses a secure connection (https) to encrypt most of its content to protect it from being intercepted by unauthorized parties, but may still have certain elements that are not encrypted, such as images or scripts. This can pose a security risk as the unencrypted information could be vulnerable to interception or manipulation by attackers. It is important to ensure that all elements on a webpage are encrypted to maintain privacy and security.