These questions deals with ethical hacking when it comes to cyber security. Please provide references:
(1) Describe different types of session hijacking. Also research session hijacking on internet and see if you can find a case where session hijacking was successfully used to perform an attack against a system. Include references in your answer.
(2) Why do you think session hijacking is still a valid attack? What makes session hijacking possible and what technical control or controls would you put in place to prevent session hijacking from being successful? What would you implement to stop session hijacking?