Page 10 - CYBERSECURITY ESSENTIALS FOR BUSINESS OWNERS
P. 10
MAN-IN-THE- MIDDLE (MITM) ATTACK
A MitM attack occurs when a hacker inserts themselves between the communications of a client and a server. Here are some common types of man-in-the-middle attacks: Session Hijacking Cybercriminals use session hijacking to gain control of the victim’s sessions and get access to resources or data. The most common method is IP spoofing, where the hijacker uses the IP of the trusted client to avail unauthorized services from a server or application.
More than one in four small businesses have no security plan at all.
STEP 1: Hijacking the Session Session
VICTIM
SNIFFING
ATTACKER
SERVER
95 PERCENT OF HHTP SERVERS ARE VULNERABLE TO MitM ATTACKS
STEP 2: Assuming the Victim’s IP Address
VICTIM
Disconnected
Introduction | Threats | NIST Security | Framework | CIS Controls | NSA Risk Levels | The Controls | How We Can Help
Compromised or Copied Traffic
SERVER
ATTACKER
THREATS