The figure below shows a Man-in-the-Middle (MITM) attack sce…
The figure below shows a Man-in-the-Middle (MITM) attack scenario targeting a power system infrastructure. (1) Identify the components involved in the MITM attack scenario and their IP/MAC addresses. (2) How does the adversary exploit the “Round Trip Time” and “Processing Time” in this attack? (3) Compare this MITM attack with a replay attack in ICS. How do their methodologies differ? (4) Why is DNP3 particularly vulnerable to MITM attacks when deployed without Secure Authentication (SA)? cybr150-hw3(1) (4).jpeg
Read Details