14. Play It [Again] Sam, or, Let’s Look at the Instant Replay

Chapter Spotlight

• Replay attacks: transactions, passwords, physical objects

• Liveness indicators: beacons, sequence numbers, nonces

• Public key cryptography to thwart replay attacks

• DNS cache poisoning; DNSSEC

• Session hijacking attacks

• Encryption countermeasures: SSH, SSL, and IPsec

Get Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.