Answer Posted / chaitanya
Packet Filtering : Packet filters are capable for filtering out and blocking packets with conflicting source address information
Avoid trust relationship : Organization should develop protocol that rely on trust relationship as little as possible
Use ARP spoofing detection software : There are programs that inspects and certifies data before it is transmitted and blocks data that is spoofed
Use cryptographic network protocols : By using secure communications protocols like TLS, SSH, HTTP secure prevents ARP spoofing attack by encrypting data prior to transmission and authenticating data when it is received
Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
Who is the best hacker in the world?
What is footprinting in ethical hacking? What is the techniques used for footprinting?
Explain what is DOS (Denial of service) attack? What are the common forms of DOS attack?
What software do hackers use?
What laptops do hackers use?
Who is the most dangerous hacker?
What tools do real hackers use?
What os do hackers use?
What are the 3 types of hackers?
How do hackers hack passwords?
What laptops hackers use?