In terms of cryptography and network security,
1. define “attack” and “threat”, giving examples
2. define the core keys of computer security
In your own words why do you think session hijacking is still a valid attack?
What makes session hijacking possible and what technical control or controls would you put in place to prevent session hijacking from being successful?
What would you implement to stop session hijacking?