Page 12 - Security Threats new3
P. 12
VI. CONCLUSION
In both the sniffing and
spoofing attacks, the victims
or the targeted persons are
completely unaware of the
fact that their data and
exchanges have been
intercepted and conceded.
This becomes one of the
greatest strengths for the
intruders who take away the
private information for their
undue benefits.
Hence, it is imperative to understand their mechanism and know ways to defend
against these attacks. Some of the ways to defend against these attacks are as follows:
• It is important to use and surf only websites that are encrypted with the “HTTPS-
.” This can be found by looking at the address of the website. The presence of
HTTPS:// in the address bar means a secure website, which makes it impossible
for the hacker to sniff out the data. (not use HTTP://)
• A Virtual Private Network or VPN helps track all your Internet movement over
an encrypted network, which is impossible for a hacker to invade and trace. This
is extremely important and useful if you are online in public as a VPN conceals
your real IP address from hackers who may attempt to track or trace it.
• Network administrators must scan and observe their network’s bandwidth
monitoring or device auditing at periodical intervals to detect any doubtful traffic
or activity.
Be mindful and aware of every activity that happens in your system to be secure and
safe at all times.