Educational and Laboratory System for Studying Man-in-the-Middle Attacks and Ways to Protect against Them
For the implementation of the Master’s program “Business Continuity and Information Security Maintenance” in the field of specialty 10.04.01 “Information Security”, a software shell of the educational laboratory complex (ELC) designed to study the “Man in the middle” network attacks has been develop...
Main Authors: | Alexander B. Sattarov, Natalia G. Miloslavskaya |
---|---|
Format: | Article |
Language: | English |
Published: |
Joint Stock Company "Experimental Scientific and Production Association SPELS
2018-12-01
|
Series: | Безопасность информационных технологий |
Subjects: | |
Online Access: | https://bit.mephi.ru/index.php/bit/article/view/1162 |
Similar Items
-
Unveiling Vulnerabilities of Web Attacks Considering Man in the Middle Attack and Session Hijacking
by: Muteeb Bin Muzammil, et al.
Published: (2024-01-01) -
Searching Malware and Sources of Its Distribution in the Internet
by: L. L. Protsenko
Published: (2011-09-01) -
THE GATES OF EXQUISITE VIEW /
by: Trenhaile, John, author
Published: (1988) -
Legal Aspects of Aircraft Hijacking
by: Sencerhan Avcı, et al.
Published: (2017-12-01) -
Techno-Economic Aspect of the Man-in-the-Middle Attacks
by: Zoran Cekerevac, et al.
Published: (2017-04-01)