Answer each of the questions below with a few sentences. Be brief, but fully explain your answer. 1. Explain what is an IPSweep and a PortSweep type of attack? 2. In a few words, explain what are buffer overflow attacks? 3. Describe and explain Denial of Service (DoS) and Distributed Denial of Service (DDoS) network attacks. 4. Briefly describe what are routing attacks. Provide two examples, highlighting their main characteristics. 5. What countermeasures would you recommend to defend against these types of attacks? Solution 1. IPsweep: The function ipswep attack is used to determine how many devices are connected to the network and check what services these devices are running. portsweep: The portsweep supports many ports to know which services provided to a single host. The port is not opened until it supports three way hand shake. 2. it is discovered in hacking circles. This is not risky application even the iput strength is not good. it must access by the administrator and the output comes from the way the input is implemented. 3. Denial of services attack : it is a one of the cyber attack. In this the hackers doesn\'t enter into your website it just unavailable your site to the user and make your website as a malcious website. There by it take down the security firewall. Distributed Denial of services attack: It mainly focuses on the multiple devices it is same as the Denial of service attack. 4. Routing attack is one of the main problem in security breach because the router sends the data in the form of packets so attackers mistreat those packets means they change the data or information and sends. and the hackers sends the malcious packets to the router there by the router gets affected and they can easily breachg into the router. Ex: Consider an organizatiopn using a router the data that is sent by router in the form of packets and these packets data when ever hacked by the hackers due to less security they change the packet data and sends back there by wrong information is registered so the adminstrator has to provide some security and authentication to the router. 5. To work against the hackers we must take active measures to defend against these attacks, The information that is sent by the attackers or hackers must not be opened in our systems so that we have to take care of not opening those keep secured with highly authentication and the password should not be in common way it has to be difficult so they cannot expect to be so. Avoid over writing the addresses.Be activity at time when suddenly if any thing wrong happens we must be in a position to handle and manage the problem because it causes more damage when time runs..