Protecting Your Network from ARP Spoofing-Based Attacks

It’s 4:45 on a Friday afternoon and you’ve got to finish that report for your team and make your 5:30 dinner reservation. You sit down at your desk and log onto the corporate Web e-mail system. You ensure that you are using an encrypted HTTP connection to the remote server because the report contains highly sensitive strategic information. When you connect to the e-mail Web server you get a strange error message, something about a mismatched SSL key. Whatever, IT must be messing around again, you think. You click “OK” and enter your username and password, log on to the system, and send your report —all in time to make your dinner reservation.