Describe different types of session hijacking
Question 1: Describe different types of session hijacking. Also research session hijacking on internet and see if you can find a case where session hijacking was successfully used to perform an attack against a system. Include references in your answer.
Question 2: Research a historic and famous virus or worm and describe why you think it was so successful. Do you think that it would still be successful today? Why or Why not? What could make it successful on today’s modern operating systems, if you chose why not?