Page 12 - Security Threats new3
P. 12

VI.    CONCLUSION

                In  both  the sniffing  and
            spoofing attacks, the victims
            or  the  targeted  persons  are
            completely  unaware  of  the
            fact  that  their  data  and
            exchanges        have      been
            intercepted  and  conceded.
            This  becomes  one  of  the
            greatest  strengths  for  the
            intruders who take away the
            private information for their
            undue benefits.







                 Hence, it is imperative to understand their mechanism and know ways to defend
            against these attacks. Some of the ways to defend against these attacks are as follows:







                •  It is important to use and surf only websites that are encrypted with the “HTTPS-
                    .” This can be found by looking at the address of the website. The presence of
                    HTTPS:// in the address bar means a secure website, which makes it impossible
                    for the hacker to sniff out the data. (not use HTTP://)


                •  A Virtual Private Network or VPN helps track all your Internet movement over
                    an encrypted network, which is impossible for a hacker to invade and trace. This
                    is extremely important and useful if you are online in public as a VPN conceals
                    your real IP address from hackers who may attempt to track or trace it.


                •  Network  administrators  must  scan  and  observe  their  network’s  bandwidth
                    monitoring or device auditing at periodical intervals to detect any doubtful traffic
                    or activity.


            Be mindful and aware of every activity that happens in your system to be secure and
            safe at all times.
   7   8   9   10   11   12   13   14   15   16   17