Data breaching in cloud computing caused by man-in-the-middle (MITM) attack / Siti Naquiah Ahmad Tarmizi Lim

Data breach is one of the biggest issues faced by organization whether in public or private sector. It is an incident where sensitive, protected or confidential data has been viewed, stolen or used by an unauthorized individual. Verizon Data Breach 2014 reported that 73% data breach causes by unauth...

Full description

Saved in:
Bibliographic Details
Main Author: Ahmad Tarmizi Lim, Siti Naquiah
Format: Thesis
Language:English
Published: 2016
Subjects:
Online Access:https://ir.uitm.edu.my/id/eprint/69022/1/69022.pdf
https://ir.uitm.edu.my/id/eprint/69022/
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Data breach is one of the biggest issues faced by organization whether in public or private sector. It is an incident where sensitive, protected or confidential data has been viewed, stolen or used by an unauthorized individual. Verizon Data Breach 2014 reported that 73% data breach causes by unauthorized access and stole password. Man-in-the-Middle (MITM) attack is one of the attacks that can gain unauthorized access without the user knows. It is one type of eavesdropping attack that occurs when attacker place himself between users or systems in a communication session. The main objective of this project is to conduct MITM attack, gain unauthorized access and causing data breach. This project also indicates to analyze the security of the https website. Graphical Network Simulator 3 (GNS3) and virtual box have been used to conduct this test in cloud computing environment that is connected to the real network. Using this set-up, attacker machine launched MITM attacks such as DNS Spoofing, session hijacking, SSL hijacking, database hijacking and remote hijacking against victim machines. Result gain shows that attacker able to cause data breach by gaining unauthorized access using stolen password.