Data breaching in cloud computing caused by man-in-the-middle (MITM) attack. / Siti Naquiah Ahmad Tarmizi Lim
Data breach is one of the biggest issue faced by organization whether in public or private sector. The main objective of this research is to simulate Man-in-the-middle (MITM) attack in cloud computing environment using Graphical Network Simulator (GNS3) and Virtual Box. Using this set-up, attacker m...
Saved in:
Main Author: | Ahmad Tarmizi Lim, Siti Naquiah (Author) |
---|---|
Format: | Book |
Subjects: | |
Online Access: | Link Metadata |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Hardware Man-in-the-Middle Attacks on Smartphones
by: Mohamed Amine Khelif, et al.
Published: (2020) -
Management Perspectives Pertaining to Root Cause Analyses of Nunn-McCurdy Breaches, Volume 6 Contractor Motivations and Anticipating Breaches
by: Arena, Mark V.
Published: (2014) -
Management Perspectives Pertaining to Root Cause Analyses of Nunn-McCurdy Breaches, Volume 4 Program Manager Tenure, Oversight of Acquisition Category II Programs, and Framing Assumptions
by: Arena, Mark V.
Published: (2013) -
Approaches to ethics for public administrators / Asmidar Lokman and Ahmad Tarmizi Talib
by: Lokman, Asmidar, et al.
Published: (2016) -
Breaching the Fortress Wall Understanding Terrorist Efforts to Overcome Defensive Technologies
by: Jackson, Brian A.
Published: (2007)