Uncategorized

where retransmission or recording of information in the packets is done using network. This threat involves programs that require authentication sequence. This is so because an intruder could replay a message authentication in a sequence to have access to system. The packet replay is not undetached easily. It could be prevented through the use of time stamping or sequence counting(Bishop

2003:68).

Leave a Reply

Your email address will not be published. Required fields are marked *