You are on page 1of 1

Reflection

Name: Surya Adhirajasa


NIM: K2223078
Man-in-the-Middle (MITM) Attack: Definition, Examples & More
https://www.strongdm.com/blog/man-in-the-middle-attack#:~:text=(MITM)%20Attack%3F-,A%20man
%2Din%2Dthe%2Dmiddle%20(MITM)%20attack,making%20unauthorized%20purchases%20or%20hacking.

Directions: Choose one of the readings that you have had from week 1-7 and/ or 8-15 and reflect on the
following.

Purpose and Strategy:


What is my purpose for reading this text, and what strategy am I using My reason I read this text is to get more knowledge about one of hacking
to approach it? method called “Man in the middle attack” and how to prevent it.
My reading strategy for this text was re-reading and summarizing the text. I read
the text for a couple of times and then restating the important part with my own
words.
“Man in the middle” is one of the hacking method in which the hacker spoofing
Comprehension and Engagement:
through website and put themselves in the middle of two parties, to steal his
Can I summarize the main points of what I've read, and am I actively
engaged with the material? victim precious or personal information and use it for malicious intent. It has
various types of attack, such as IP spoofing, wi-fi eavesdropping, email
hijacking, etc. The hacker used this method in order to deceive the user because
it looks like they’re interacting with trustworthy site. We can prevent it by as
avoid unsecure / public wi-fi, encrypt my email, and pay attention to obscure
websites or email addresses.
Type of Text and Understanding: The text I read is informative text about problem and solutions.
What type of text am I reading, and do I understand the specific In this text the author describes or identifying the problem which is hacking
features or structures associated with it? attack called “man in the middle” and then giving the outcome of that attack. In
the end this text also mentions on how to intercepts and prevent this hacking
method.
Application and Reflection: I can apply this text’s suggestion about preventing hacking, such as avoid
How can I apply what I've learned from this reading, and what insights unsecure / public wi-fi, encrypt my email, pay attention to obscure websites or
or connections have I made? email addresses, and many others. This text gave me insight about how “man in
the middle attack” works and how to prevent it.

Improvement and Future Practice: The steps I can take in order to improve my reading skill are increasing my
What steps can I take to improve my reading skills and habits, and reading frequency, by using my spare time to read books or articles and explore
how can I adapt my strategy for future readings? other kind of books, since I mainly just read novels.
In the future I will try to make annotation to summarize and highlighting
important part so that I can engage more with my reading objects and get a
deeper understanding .

You might also like