DeMISTIfying Infosec: Hop Point

By Katherine Teitler

Hop Point

Packets of digital data travel from source to destination through “hops,” or stops along the networking path. Data can travel in a single hop (direct) or in a multi-hop network (more than one relay). In a multi-hop network, traffic is rerouted from one gateway, router, or device to the next (somewhat akin to airline routes).

A “hop point” generally refers to a compromised connection or relay—hop—that the attacker uses to obfuscate the path of the data packet s/he wants to intercept. A hop point, therefore, is the “middle man” device.


Get the DeMISTIfying InfoSec newsletter every Tuesday!


Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms and Conditions and Privacy Policy.