Data breaching in cloud computing caused by man-in-the-middle (MITM) attack / Siti Naquiah Ahmad Tarmizi Lim

Data breach is one of the biggest issues faced by organization whether in public or private sector. It is an incident where sensitive, protected or confidential data has been viewed, stolen or used by an unauthorized individual. Verizon Data Breach 2014 reported that 73% data breach causes by unauth...

Full description

Saved in:
Bibliographic Details
Main Author: Ahmad Tarmizi Lim, Siti Naquiah
Format: Thesis
Language:English
Published: 2016
Subjects:
Online Access:https://ir.uitm.edu.my/id/eprint/69022/1/69022.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-uitm-ir.69022
record_format uketd_dc
spelling my-uitm-ir.690222023-03-16T02:59:02Z Data breaching in cloud computing caused by man-in-the-middle (MITM) attack / Siti Naquiah Ahmad Tarmizi Lim 2016 Ahmad Tarmizi Lim, Siti Naquiah Mobile computing Intrusion detection systems (Computer security). Computer network security. Hackers Data breach is one of the biggest issues faced by organization whether in public or private sector. It is an incident where sensitive, protected or confidential data has been viewed, stolen or used by an unauthorized individual. Verizon Data Breach 2014 reported that 73% data breach causes by unauthorized access and stole password. Man-in-the-Middle (MITM) attack is one of the attacks that can gain unauthorized access without the user knows. It is one type of eavesdropping attack that occurs when attacker place himself between users or systems in a communication session. The main objective of this project is to conduct MITM attack, gain unauthorized access and causing data breach. This project also indicates to analyze the security of the https website. Graphical Network Simulator 3 (GNS3) and virtual box have been used to conduct this test in cloud computing environment that is connected to the real network. Using this set-up, attacker machine launched MITM attacks such as DNS Spoofing, session hijacking, SSL hijacking, database hijacking and remote hijacking against victim machines. Result gain shows that attacker able to cause data breach by gaining unauthorized access using stolen password. 2016 Thesis https://ir.uitm.edu.my/id/eprint/69022/ https://ir.uitm.edu.my/id/eprint/69022/1/69022.pdf text en public masters Universiti Teknologi MARA (UiTM) Faculty of Electrical Engineering Yussoff, Yusnani Mohd
institution Universiti Teknologi MARA
collection UiTM Institutional Repository
language English
advisor Yussoff, Yusnani Mohd
topic Mobile computing
Mobile computing
spellingShingle Mobile computing
Mobile computing
Ahmad Tarmizi Lim, Siti Naquiah
Data breaching in cloud computing caused by man-in-the-middle (MITM) attack / Siti Naquiah Ahmad Tarmizi Lim
description Data breach is one of the biggest issues faced by organization whether in public or private sector. It is an incident where sensitive, protected or confidential data has been viewed, stolen or used by an unauthorized individual. Verizon Data Breach 2014 reported that 73% data breach causes by unauthorized access and stole password. Man-in-the-Middle (MITM) attack is one of the attacks that can gain unauthorized access without the user knows. It is one type of eavesdropping attack that occurs when attacker place himself between users or systems in a communication session. The main objective of this project is to conduct MITM attack, gain unauthorized access and causing data breach. This project also indicates to analyze the security of the https website. Graphical Network Simulator 3 (GNS3) and virtual box have been used to conduct this test in cloud computing environment that is connected to the real network. Using this set-up, attacker machine launched MITM attacks such as DNS Spoofing, session hijacking, SSL hijacking, database hijacking and remote hijacking against victim machines. Result gain shows that attacker able to cause data breach by gaining unauthorized access using stolen password.
format Thesis
qualification_level Master's degree
author Ahmad Tarmizi Lim, Siti Naquiah
author_facet Ahmad Tarmizi Lim, Siti Naquiah
author_sort Ahmad Tarmizi Lim, Siti Naquiah
title Data breaching in cloud computing caused by man-in-the-middle (MITM) attack / Siti Naquiah Ahmad Tarmizi Lim
title_short Data breaching in cloud computing caused by man-in-the-middle (MITM) attack / Siti Naquiah Ahmad Tarmizi Lim
title_full Data breaching in cloud computing caused by man-in-the-middle (MITM) attack / Siti Naquiah Ahmad Tarmizi Lim
title_fullStr Data breaching in cloud computing caused by man-in-the-middle (MITM) attack / Siti Naquiah Ahmad Tarmizi Lim
title_full_unstemmed Data breaching in cloud computing caused by man-in-the-middle (MITM) attack / Siti Naquiah Ahmad Tarmizi Lim
title_sort data breaching in cloud computing caused by man-in-the-middle (mitm) attack / siti naquiah ahmad tarmizi lim
granting_institution Universiti Teknologi MARA (UiTM)
granting_department Faculty of Electrical Engineering
publishDate 2016
url https://ir.uitm.edu.my/id/eprint/69022/1/69022.pdf
_version_ 1783735833724977152