Answer:
An attack whereby an active, established, session is intercepted and co-opted by the attacker. IP Splicing attacks may occur after an authentication has been made, permitting the attacker to assume the role of an already authorized user. Primary protections against IP Splicing rely on encryption at the session or network layer.
Previous Question | Next Question |
Explain employee assistance program (EAP) application is now required to be deployed? | What is Tunneling Router? |