where retransmission or recording of information in the packets is done using network. This threat involves programs that require authentication sequence. This is so because an intruder could replay a message authentication in a sequence to have access to system. The packet replay is not undetached easily. It could be prevented through the use of time stamping or sequence counting(Bishop
Comments Off on where retransmission or recording of information in the packets is done using network. This threat involves programs that require authentication sequence. This is so because an intruder could replay a message authentication in a sequence to have access to system. The packet replay is not undetached easily. It could be prevented through the use of time stamping or sequence counting(Bishop