CAs are used to issue trusted certificates, digital signatures or keys to the person using it. This way we can have systems in place that’ll revoke any certificate coming from a non-trusted source (Truth, S, 2011). For example, an attacker may have generated their own key or certificate but it isn’t recognised as a trusted source and therefore our systems can deny it. 3.1.2. Latency Examination
By monitoring the time for messages to be sent between the communicators we can further secure our communications. For instance if we are using some form of encryption and someone is performing a MITM attack they may be using a program to crack and decipher our encrypted messages, then performing any modifications they wish to make …show more content…
Honeypot
A honeypot is effectively a trap for potential attackers. Generally it’s a computer isolated from your network that is setup to look like it is part of the network and is designed to appear as though it contains important information. Desirably this’ll draw the attention of attackers. By having a honeypot you can monitor it so you can detect attackers faster and don’t require performance taxing protocols running on all of your systems in your network. Hopefully those wishing to snoop your network will be focused towards your honeypot and then you can monitor the attacker and reduce potential impact from them (Wikipedia - Honeypot, 2015).
4. Conclusion
MITM attacks are difficult to avoid because even if they are occurring you do not often know about them. The best we can do is mitigate the chance of them occurring by making it more difficult for attackers by using cryptographic techniques. This can then be followed up with other techniques to further enhance the secureness and private-ness of our communications. We want to protect against MITM attacks to keep our sensitive data private and avoid any negative implications that releasing this data may