Description
River Kelly and Peyton Dorsh
Exercise 1 (15 pts)
UML Class Diagram
Strategy Sequence Diagram
Adapter Sequence Diagram
Exercise 2 (10 pts)
1. Man in the Middle attacks is where a third party secretly listens in on communications between two other parties. An example is a foreign spy agency intercepting messages meant for an important government official and then forwarding those messages while pretending to be the original sender. This would let them secretly listen in on highly classified information or even stop messages from reaching the intended receiver.
2. Cross-Site Scripting attacks are when a party sends a script message to a website that is then executed by the server. An example would be sending a script that quietly steals login information for amazon accounts by sending the information to themselves before letting the user log in. This party could use the information to order products using stolen credit card information or steal AWS credits for crypto mining.




Reviews
There are no reviews yet.