Which option best describes the following situation: An attacker has intercepted network packets between a browser and web server. The attack then re-transmits the intercepted data to the web server hoping the server will respond with useful information (e.g. a session id, credit card information, etc.).
Threats, Attacks and Vulnerabilities | |
Technologies and Tools | |
Architecture and Design | |
Identity and Access Management | |
Risk Management | |
Cryptography and PKI |