Suppose Alice and Bob are sending packets to each other over a computer network. Suppose Trudy positions herself in the network so that she can capture all the packets sent by Alice and send whatever she wants to Bob; she can also capture all the packets sent by Bob and send whatever she wants to Alice.

Required:
List some of the malicious things Trudy can do from this position.

Respuesta :

Answer:

Trudy can

1. corrupt the packet sent over the network

2. fail to deliver packet to the receiver

3. compromise private data

4. can drop packets

5. modify the packet

Explanation:

the question tells us about the transfer of packets between two people or clients. but there is now a third person Trudy because the network has been compromised. so Trudy can capture the packets and use them maliciously from her position by:

corrupting the data packets of either Bob or alice or both and this would end up causing discrepancies between what was sent and what was intended by the sender

trudy would have seen all the contents of this packet and still pretend like she knows nothing about it. Data loss can occur because trudy might receive packet and maliciously fail to deliver it to the intended receiver leading to a compromise and loss of data.

trudy can compromise private data by pretending, listening and observing from her position while acting as either Bob or alice and she can modify data, misuse data or even drop it.