CAS Community   >   Resources   >  

Mitm_diagramm_1_
Man in the Middle Attacks

T-Level Cyber Security - Man in the Middle Attacks - Includes an imposter type game

Paul Shaddick

Created by Paul Shaddick
last edited Apr 05 2019 by Paul Shaddick


  • What is a ‘Man in the Middle’ attack?
  • Examples:
    1. Mail Redirection
    2. Evil Twin (Captive Portal)
    3. ARP Cache Poisoning
  • Slide 10 is intended to be printed and cut up for use by groups of 4 (or 3 excluding Dave). It’s a ‘find the imposter’ type game. Students discuss after playing to consider how well it fits the MITM definition.

Level: Advanced

Duration: 45-60 minutes

Teaches: Network security threats, MITM, game

Downloaded 83 times.

Download

This resource has attached files: to access these files, please tick the box below to assent to the license terms
License: The resources on CAS website are under Creative Commons Attribution-Share Alike 3.0 licence unless otherwise specified by the resource creators.

You must confirm that you have read and agree the licence's ToS before you can download the attachments of this resource.

I have read the licence agreement of this resource and agree to abide by its terms and conditions.

Feedback and Comments


Available when logged in (join via the front page, for free):
  • View 1 comments on this resource.
  • View resource history, links to related resources.
  • Leave feedback for the author(s), or help by editing the resource.
Categories: