Content

DeMISTIfying Infosec: Hop Point

By Katherine Teitler

Hop Point

Packets of digital data travel from source to destination through “hops,” or stops along the networking path. Data can travel in a single hop (direct) or in a multi-hop network (more than one relay). In a multi-hop network, traffic is rerouted from one gateway, router, or device to the next (somewhat akin to airline routes).

A “hop point” generally refers to a compromised connection or relay—hop—that the attacker uses to obfuscate the path of the data packet s/he wants to intercept. A hop point, therefore, is the “middle man” device.

Source: http://www.slideshare.net/habibur01/directed-diffusion-for-wireless-sensor-networking

Get the DeMISTIfying InfoSec newsletter every Tuesday!

 

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

You can skip this ad in 5 seconds