You are on page 1of 2

Reflection

Name: Surya Adhirajasa


NIM: K2223078
Man-in-the-Middle (MITM) Attack: Definition, Examples & More
https://www.strongdm.com/blog/man-in-the-middle-attack#:~:text=(MITM)%20Attack%3F-
,A%20man%2Din%2Dthe%2Dmiddle%20(MITM)%20attack,making%20unauthorized%20purchases%20or%
20hacking.

Directions: Choose one of the readings that you have had from week 1-7 and/ or 8-15 and reflect on the
following.

Purpose and Strategy:


My reason I read this text is to get more knowledge about one of hacking
What is my purpose for reading this text, and what strategy am I using
method called “Man in the middle attack” and how to prevent it.
to approach it?
My reading strategy for this text was re-reading and summarizing the text. I read
the text for a couple of times and then restating the important part with my own
words.
“Man in the middle” is one of the hacking method in which the hacker spoofing
Comprehension and Engagement:
through website and put themselves in the middle of two parties, to steal his
Can I summarize the main points of what I've read, and am I actively
victim precious or personal information and use it for malicious intent. It has
engaged with the material?
various types of attack, such as IP spoofing, wi-fi eavesdropping, email
hijacking, etc. The hacker used this method in order to deceive the user because
it looks like they’re interacting with trustworthy site. We can prevent it by as
avoid unsecure / public wi-fi, encrypt my email, and pay attention to obscure
websites or email addresses.
The text I read is informative text about problem and solutions.
Type of Text and Understanding:
In this text the author describes or identifying the problem which is hacking
What type of text am I reading, and do I understand the specific
attack called “man in the middle” and then giving the outcome of that attack. In
features or structures associated with it?
the end this text also mentions on how to intercepts and prevent this hacking
method.
I can apply this text’s suggestion about preventing hacking, such as avoid
Application and Reflection:
unsecure / public wi-fi, encrypt my email, pay attention to obscure websites or
How can I apply what I've learned from this reading, and what insights
or connections have I made? email addresses, and many others. This text gave me insight about how “man in
the middle attack” works and how to prevent it.

The steps I can take in order to improve my reading skill are increasing my
Improvement and Future Practice:
reading frequency, by using my spare time to read books or articles and explore
What steps can I take to improve my reading skills and habits, and
other kind of books, since I mainly just read novels.
how can I adapt my strategy for future readings?
In the future I will try to make annotation to summarize and highlighting
important part so that I can engage more with my reading objects and get a
deeper understanding .

You might also like