|
 |
 |
What is the fiber channel? by alan david230
 |
|
|
What is the fiber channel? |
|
|
|
Computers,Business Opportunities,Investment
|
 |
A middle man attack is the act of an untrusted third party intercepting communication between two trusted entities for example when we call a friend on the telephone then you dial his and wait for an answer. When he picks up the phone and then begins communicating with him. Then meanwhile a malicious user would intercept the connection between both of you it mean you would communicate actually third party when both of you would begin communicating not knowing that an unauthorized entity has connected you both and is listening to every word of the conversation. This call is three way calls but two of the three callers do not know that three is a third person listening. The third party plays the role of a router but unlike an authorized router. Third party should not have permission to view and modify any of the communication between the two trusted entities. The middle man attacks were first introduced many year ago in the IP networking world. The Unauthenticated OSI layer 2 Address Resolution Protocol (ARP) packets could update ARP tables in switches and/or operating systems. The purpose of middle man attacks is to sniff on a switch. When a switch will only transmit information to the correct ports not allowing any other ports to see any communication that is not theirs. A hub is a dumber device that allows all ports to see all communication and making it quite easy to sniff a neighbor's traffic. Many switches consist are layer 2 devices. It means that they can transmit packets from one port on a switch to another without the need for an IP address but with a node's machine address. For example when on windows operating system, type ipconfig /all from the command line and then press Enter. The we notice the physical address is the machine address of your node which is actually the MAC address of your Network Interface card the IP address of their machine comes from the manufacturer of the NIC to identify it the node wanted to speak to another node via a layer two switch it would use the MAC address and not your IP address. The layer two routing is common for performance reasons and allowing switches to transfer packets quickly across the network and once packets get to a layer 3 device such as a router then a node's IP address can be used. Siconsult is offering Si ELV Design consultant KSA services to offices of all type and also offering expert level recommendation to them so that they will get best protection against such incidents.
Related Articles -
Si Managed Security Services, SiConsult Managed Security Services, Security Consulting, Si, Si ICT Consulting, ICT Consulting, Si Engineering & Tech,
|
Rate This Article |
|
 |
|
Do you Agree or Disagree? Have a Comment? POST IT!
Reader Opinions |
|
 |
|
|
|
 |
 |
 |
Author Login |
|
 |
Advertiser Login
ADVERTISE HERE NOW!
Limited Time $60 Offer!
90 Days-1.5 Million Views

 |
 |
TIM FAY
After 60-plus years of living, I am just trying to pass down some of the information that I have lea...more
|
 |
 |
 |
 |
ADRIAN JOELE
I have been involved in nutrition and weight management for over 12 years and I like to share my kn...more
|
 |
 |
 |
 |
GENE MYERS
Author of four books and two screenplays; frequent magazine contributor. I have four other books "in...more
|
 |
 |
 |
 |
LAURA JEEVES
At LeadGenerators, we specialise in content-led Online Marketing Strategies for our clients in the t...more
|
 |
 |
 |
 |
MICHAEL BRESCIANI
Rev Bresciani is the author of two Christian books. One book is an important and concisely written b...more
|
 |
 |
 |
 |
STEPHEN BYE
Steve Bye is currently a fiction writer, who published his first novel, ‘Looking Forward Through the...more
|
 |
 |
 |
 |
LEVAL AINAH
I am an internet marketer and also an educator. My goal is to help others who are looking to improve...more
|
 |
 |
 |
 |
PAUL PHILIPS
For more articles, blog messages & videos and a free e-book download go to www.NewParadigm.ws your p...more
|
 |
 |
 |
 |
ALEX BELSEY
I am the editor of QUAY Magazine, a B2B publication based in the South West of the UK. I am also the...more
|
 |
 |
|