New Activity
Play Fill in the Blanks Game
1 . Based on the " Mitigating a Fallacy " rules :
Executing ____________________ on victim = = executing an attack

2 . The man - in - the - middle attack ( often abbreviated MitM , also known as a bucket brigade attack , or sometimes Janus attack ) in cryptography and computer security is a form of active ____________________ in which the attacker makes independent connections with the victims and ____________________ messages between them , making them believe that they are talking directly to each other over a private connection , when in fact the entire conversation is controlled by the attacker .

3 . The attacker must be able to ____________________ all messages going between the two victims and inject new ones , which is straightforward in many circumstances ( for example , an attacker within reception range of an unencrypted Wi - Fi wireless access point , can insert himself as a man - in - the - middle ) .

4 . A man - in - the - middle attack can succeed only when the attacker can impersonate each endpoint to the satisfaction of the other ? it is an attack on mutual ____________________ ( or lack thereof ) . Most ____________________ protocols include some form of endpoint authentication specifically to prevent MITM attacks . For example , SSL can authenticate one or both parties using a mutually trusted certification authority .

5 . Various defenses against MITM attacks use authentication techniques that are based on the ____________________ key infrastructures .

6 . Stronger mutual authentication , such as :
Secret ____________________ ( which are usually high information entropy secrets , and thus more secure ) , or
Passwords ( which are usually low information entropy secrets , and thus less secure ) .