Which of the following statements are true about session hijacking?
Each correct answer represents a complete solution. Choose all that apply.
A.
Use of a long random number or string as the session key reduces session hijacking.
B.
It is used to slow the working of victim’s network resources.
C.
TCP session hijacking is when a hacker takes over a TCP session between two machines.
D.
It is the exploitation of a valid computer session to gain unauthorized access to information or services in a computer system.