Page 471 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 471

parties (often a request for authentication) and then later “replays” the
               captured message to open a new session. This attack can be defeated

               by incorporating a time stamp and expiration period into each
               message.
   466   467   468   469   470   471   472   473   474   475   476