Information Communication Technology
Write a 4 page paper (deliverable length does not include the title and reference pages)
Explain what happens when a session is hijacked
Describe the difference between spoofing and hijacking
Name and describe the steps in conducting a session hijacking attack
Describe different types of session hijacking
Perform sequence number prediction