1,830
13
Case Study, 2 pages (350 words)

Arp poisoning case study example

Introduction

With the electronic world that we have today, email communication remains one of the most essential tools that are used for communication. It forms the backbone of communication in many organizations. The use of email will grow from time to time. As the growth is seen to be exponential, its security is an important aspect that should be considered. The security implications of email storage, the policy implementation and enforcement and data recovery are the issues that are being considered today. In order to avoid failures, there is need to manage large data information in a well-organized and secure manner .

Man-in-the-middle attacks
This is an attack which is common in local area networks. This attack is a form of active and aggressive eavesdropping where the attacker will create independent connections between the parties communicating so that the attacker will feign either parties communicating. In the end, the parties communicating will think that they are having a private communication and yet in the real sense, the communication is being controlled by the attacker.

MAC flooding

MAC flooding is ARP cache poisoning technique that is targeted at switches. There is a difference between switches and hubs. Switches send network packets to particular host that was meant to get the information. Hubs just rebroadcast all the information and traffic they get. They do not have a mechanism which will enable them to check where the traffic is headed. There are some switches which go to hub mode when they become overloaded. Hackers will take advantage of this by ensuring that traffic is overloaded to the switch so that they get access to the traffic and therefore be able to packet sniff the network. This is possible when the switch is in the hub mode.

References

Tan, C., & Ruighaver, A. (2005). A framework for investigating the development of security strategy context in organizations. Conference Proceedings of the 6th Australian Information Warfare and Security Conference: Protecting the Australian Homeland (pp. 216-226). Sydney: Deakin University.
Tan, C., & Ruighaver, A. (2004). Developing a framework for understanding security governance . Second Australian Information Security Management Conference Proceedings (pp. 1-11). Sydney: Edith Cowan University.

Thank's for Your Vote!
Arp poisoning case study example. Page 1
Arp poisoning case study example. Page 2
Arp poisoning case study example. Page 3

This work, titled "Arp poisoning case study example" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Case Study

References

AssignBuster. (2022) 'Arp poisoning case study example'. 20 September.

Reference

AssignBuster. (2022, September 20). Arp poisoning case study example. Retrieved from https://assignbuster.com/arp-poisoning-case-study-example/

References

AssignBuster. 2022. "Arp poisoning case study example." September 20, 2022. https://assignbuster.com/arp-poisoning-case-study-example/.

1. AssignBuster. "Arp poisoning case study example." September 20, 2022. https://assignbuster.com/arp-poisoning-case-study-example/.


Bibliography


AssignBuster. "Arp poisoning case study example." September 20, 2022. https://assignbuster.com/arp-poisoning-case-study-example/.

Work Cited

"Arp poisoning case study example." AssignBuster, 20 Sept. 2022, assignbuster.com/arp-poisoning-case-study-example/.

Get in Touch

Please, let us know if you have any ideas on improving Arp poisoning case study example, or our service. We will be happy to hear what you think: [email protected]