Computer security ---- pls do not copy something here. use your own word to explain it.

Business, Finance, Economics, Accounting, Operations Management, Computer Science, Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Algebra, Precalculus, Statistics and Probabilty, Advanced Math, Physics, Chemistry, Biology, Nursing, Psychology, Certifications, Tests, Prep, and more.
Post Reply
answerhappygod
Site Admin
Posts: 899603
Joined: Mon Aug 02, 2021 8:13 am

Computer security ---- pls do not copy something here. use your own word to explain it.

Post by answerhappygod »

Computer security
Computer Security Pls Do Not Copy Something Here Use Your Own Word To Explain It 1
Computer Security Pls Do Not Copy Something Here Use Your Own Word To Explain It 1 (64.85 KiB) Viewed 24 times
----
pls do not copy something here. use your own word to explain
it.
You are an attacker. You would like to snoop on the traffic between a specific TOR user and a specific website. This website is open to the public (not on a .onion address), but the user only connects to the website via TOR. For the sake of this exercise you are able to install a monitoring utility (hardware or software) at any part of the TOR network. In other words, you have the ability to infect and monitor any point of the network traffic, including the following locations: Install a trojan on the device that the user is using to access the website via TOR . Compromise a TOR entry node • Compromise a TOR relay node • Compromise a TOR exit node • Compromise the website that the user is connecting to For EACH item, describe if it would allow you to be able to monitor the traffic between the user and the website. If so, what are your chances of collecting target on your specific user ONLY (and not another random user that might be accessing the same website).
Join a community of subject matter experts. Register for FREE to view solutions, replies, and use search function. Request answer by replying!
Post Reply