Data breaching in cloud computing caused by man-in-the-middle (MITM) attack / Siti Naquiah Ahmad Tarmizi Lim

Data breach is one of the biggest issues faced by organization whether in public or private sector. It is an incident where sensitive, protected or confidential data has been viewed, stolen or used by an unauthorized individual. Verizon Data Breach 2014 reported that 73% data breach causes by unauth...

Full description

Saved in:
Bibliographic Details
Main Author: Ahmad Tarmizi Lim, Siti Naquiah
Format: Thesis
Language:English
Published: 2016
Subjects:
Online Access:https://ir.uitm.edu.my/id/eprint/69022/1/69022.pdf
https://ir.uitm.edu.my/id/eprint/69022/
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.uitm.ir.69022
record_format eprints
spelling my.uitm.ir.690222023-03-16T02:59:02Z https://ir.uitm.edu.my/id/eprint/69022/ Data breaching in cloud computing caused by man-in-the-middle (MITM) attack / Siti Naquiah Ahmad Tarmizi Lim Ahmad Tarmizi Lim, Siti Naquiah Mobile computing Intrusion detection systems (Computer security). Computer network security. Hackers Data breach is one of the biggest issues faced by organization whether in public or private sector. It is an incident where sensitive, protected or confidential data has been viewed, stolen or used by an unauthorized individual. Verizon Data Breach 2014 reported that 73% data breach causes by unauthorized access and stole password. Man-in-the-Middle (MITM) attack is one of the attacks that can gain unauthorized access without the user knows. It is one type of eavesdropping attack that occurs when attacker place himself between users or systems in a communication session. The main objective of this project is to conduct MITM attack, gain unauthorized access and causing data breach. This project also indicates to analyze the security of the https website. Graphical Network Simulator 3 (GNS3) and virtual box have been used to conduct this test in cloud computing environment that is connected to the real network. Using this set-up, attacker machine launched MITM attacks such as DNS Spoofing, session hijacking, SSL hijacking, database hijacking and remote hijacking against victim machines. Result gain shows that attacker able to cause data breach by gaining unauthorized access using stolen password. 2016 Thesis NonPeerReviewed text en https://ir.uitm.edu.my/id/eprint/69022/1/69022.pdf Data breaching in cloud computing caused by man-in-the-middle (MITM) attack / Siti Naquiah Ahmad Tarmizi Lim. (2016) Masters thesis, thesis, Universiti Teknologi MARA (UiTM).
institution Universiti Teknologi Mara
building Tun Abdul Razak Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Mara
content_source UiTM Institutional Repository
url_provider http://ir.uitm.edu.my/
language English
topic Mobile computing
Intrusion detection systems (Computer security). Computer network security. Hackers
spellingShingle Mobile computing
Intrusion detection systems (Computer security). Computer network security. Hackers
Ahmad Tarmizi Lim, Siti Naquiah
Data breaching in cloud computing caused by man-in-the-middle (MITM) attack / Siti Naquiah Ahmad Tarmizi Lim
description Data breach is one of the biggest issues faced by organization whether in public or private sector. It is an incident where sensitive, protected or confidential data has been viewed, stolen or used by an unauthorized individual. Verizon Data Breach 2014 reported that 73% data breach causes by unauthorized access and stole password. Man-in-the-Middle (MITM) attack is one of the attacks that can gain unauthorized access without the user knows. It is one type of eavesdropping attack that occurs when attacker place himself between users or systems in a communication session. The main objective of this project is to conduct MITM attack, gain unauthorized access and causing data breach. This project also indicates to analyze the security of the https website. Graphical Network Simulator 3 (GNS3) and virtual box have been used to conduct this test in cloud computing environment that is connected to the real network. Using this set-up, attacker machine launched MITM attacks such as DNS Spoofing, session hijacking, SSL hijacking, database hijacking and remote hijacking against victim machines. Result gain shows that attacker able to cause data breach by gaining unauthorized access using stolen password.
format Thesis
author Ahmad Tarmizi Lim, Siti Naquiah
author_facet Ahmad Tarmizi Lim, Siti Naquiah
author_sort Ahmad Tarmizi Lim, Siti Naquiah
title Data breaching in cloud computing caused by man-in-the-middle (MITM) attack / Siti Naquiah Ahmad Tarmizi Lim
title_short Data breaching in cloud computing caused by man-in-the-middle (MITM) attack / Siti Naquiah Ahmad Tarmizi Lim
title_full Data breaching in cloud computing caused by man-in-the-middle (MITM) attack / Siti Naquiah Ahmad Tarmizi Lim
title_fullStr Data breaching in cloud computing caused by man-in-the-middle (MITM) attack / Siti Naquiah Ahmad Tarmizi Lim
title_full_unstemmed Data breaching in cloud computing caused by man-in-the-middle (MITM) attack / Siti Naquiah Ahmad Tarmizi Lim
title_sort data breaching in cloud computing caused by man-in-the-middle (mitm) attack / siti naquiah ahmad tarmizi lim
publishDate 2016
url https://ir.uitm.edu.my/id/eprint/69022/1/69022.pdf
https://ir.uitm.edu.my/id/eprint/69022/
_version_ 1761622292321796096
score 13.160551