Identify and describe the different attacks on network protocols. Specifically discuss ping floods, redirection attacks, SYN flood attack, source routing attack, and IP spoofing.
2-3 paragraphs
Identify and describe the different attacks on network protocols. Specifically discuss ping floods, redirection attacks, SYN flood attack, source routing attack, and IP spoofing.
2-3 paragraphs