SlideShare a Scribd company logo
1 of 1
Download to read offline
Identifying a relevant cyberattack that affect protocol behaviour and answer the questions
indicated below: 1. Identify the protocol and cyberattack you have chosen. 2. Describe the
selected protocol. In particular, identify the protocol, which layers it operates in the TCP/IP
model, and what functionality this protocol provides in a computer network. 3. Explain the
normal operation of the protocol relevant to the cyberattack you have chosen. 4. Identify and
briefly explain the vulnerabilities in the protocol that have allowed the cyberattack to occur. 5.
Describe the selected cyberattack. In particular, explain how the cyberattack invokes the
vulnerabilities you identified in (4) and discuss the potential damage/impacts of the attack. Hints
To understand the expectations of this task, consider a simple example of the TCP SYN Flood
(cannot be used): in (2) you would explain what the TCP protocol is and what it's used for, in (3)
you'd explain the TCP three-way handshake (targeted by the attack), in (4) you'd explain the
problem with how operating systems reserved limited resources upon receiving a SYN request
without validating/verifying the request, and for (5) you'd explain how the SYN flood actually
works by sending many SYNs addressing the vulnerability identified in (4), resulting in resource
exhaustion and Denial of Service.

More Related Content

Similar to Identifying a relevant cyberattack that affect protocol behaviour and.pdf

Unit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi ModelUnit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi ModelJacqueline Thomas
 
Reversing and Decrypting the Communications of APT Malware (Etumbot)
Reversing and Decrypting the Communications of APT Malware (Etumbot)Reversing and Decrypting the Communications of APT Malware (Etumbot)
Reversing and Decrypting the Communications of APT Malware (Etumbot)securityxploded
 
Module 10 (session hijacking)
Module 10 (session hijacking)Module 10 (session hijacking)
Module 10 (session hijacking)Wail Hassan
 
Report on TCP vulnerabilities
Report on TCP vulnerabilitiesReport on TCP vulnerabilities
Report on TCP vulnerabilitiesPrakhar Bansal
 
Lesson.7: Configuring IP Routing B
Lesson.7: Configuring IP Routing BLesson.7: Configuring IP Routing B
Lesson.7: Configuring IP Routing BMahmmoud Mahdi
 
Lab-6 Sniffing Sniffing is an essential method of collec.docx
Lab-6 Sniffing        Sniffing is an essential method of collec.docxLab-6 Sniffing        Sniffing is an essential method of collec.docx
Lab-6 Sniffing Sniffing is an essential method of collec.docxLaticiaGrissomzz
 
Reverse Engineering Malware
Reverse Engineering MalwareReverse Engineering Malware
Reverse Engineering Malwaresecurityxploded
 
Network Monitoring with Wireshark
Network Monitoring with WiresharkNetwork Monitoring with Wireshark
Network Monitoring with WiresharkSiddharth Coontoor
 
Отчет Audit report RAPID7
 Отчет Audit report RAPID7 Отчет Audit report RAPID7
Отчет Audit report RAPID7Sergey Yrievich
 
1.- Networking Models, Devices.pdf
1.- Networking Models, Devices.pdf1.- Networking Models, Devices.pdf
1.- Networking Models, Devices.pdfOpositorGonzalez1
 
Cisco discovery d homesb module 6 - v.4 in english.
Cisco discovery   d homesb module 6 - v.4 in english.Cisco discovery   d homesb module 6 - v.4 in english.
Cisco discovery d homesb module 6 - v.4 in english.igede tirtanata
 

Similar to Identifying a relevant cyberattack that affect protocol behaviour and.pdf (20)

Unit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi ModelUnit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi Model
 
Group presentation ii
Group presentation iiGroup presentation ii
Group presentation ii
 
Reversing and Decrypting the Communications of APT Malware (Etumbot)
Reversing and Decrypting the Communications of APT Malware (Etumbot)Reversing and Decrypting the Communications of APT Malware (Etumbot)
Reversing and Decrypting the Communications of APT Malware (Etumbot)
 
Module 10 (session hijacking)
Module 10 (session hijacking)Module 10 (session hijacking)
Module 10 (session hijacking)
 
Report on TCP vulnerabilities
Report on TCP vulnerabilitiesReport on TCP vulnerabilities
Report on TCP vulnerabilities
 
Lesson.7: Configuring IP Routing B
Lesson.7: Configuring IP Routing BLesson.7: Configuring IP Routing B
Lesson.7: Configuring IP Routing B
 
Module 1 slides
Module 1 slidesModule 1 slides
Module 1 slides
 
Lab-6 Sniffing Sniffing is an essential method of collec.docx
Lab-6 Sniffing        Sniffing is an essential method of collec.docxLab-6 Sniffing        Sniffing is an essential method of collec.docx
Lab-6 Sniffing Sniffing is an essential method of collec.docx
 
Cs6004 cyber fofrensics_qb
Cs6004 cyber fofrensics_qbCs6004 cyber fofrensics_qb
Cs6004 cyber fofrensics_qb
 
Reverse engineering malware
Reverse engineering malwareReverse engineering malware
Reverse engineering malware
 
Reverse Engineering Malware
Reverse Engineering MalwareReverse Engineering Malware
Reverse Engineering Malware
 
business
businessbusiness
business
 
Network Monitoring with Wireshark
Network Monitoring with WiresharkNetwork Monitoring with Wireshark
Network Monitoring with Wireshark
 
Sudheer tech seminor
Sudheer tech seminorSudheer tech seminor
Sudheer tech seminor
 
Netdefender
NetdefenderNetdefender
Netdefender
 
Отчет Audit report RAPID7
 Отчет Audit report RAPID7 Отчет Audit report RAPID7
Отчет Audit report RAPID7
 
Report PAPID 7
Report PAPID 7Report PAPID 7
Report PAPID 7
 
1.- Networking Models, Devices.pdf
1.- Networking Models, Devices.pdf1.- Networking Models, Devices.pdf
1.- Networking Models, Devices.pdf
 
Cisco discovery d homesb module 6 - v.4 in english.
Cisco discovery   d homesb module 6 - v.4 in english.Cisco discovery   d homesb module 6 - v.4 in english.
Cisco discovery d homesb module 6 - v.4 in english.
 
Net Defender
Net DefenderNet Defender
Net Defender
 

More from amirthaconsultancy

II 5. The - basic - accounting concept that refers to - the .pdf
 II 5. The - basic - accounting  concept  that  refers  to - the  .pdf II 5. The - basic - accounting  concept  that  refers  to - the  .pdf
II 5. The - basic - accounting concept that refers to - the .pdfamirthaconsultancy
 
Ifter reading and studying this chapter, the successful student shoul.pdf
 Ifter reading and studying this chapter, the successful student shoul.pdf Ifter reading and studying this chapter, the successful student shoul.pdf
Ifter reading and studying this chapter, the successful student shoul.pdfamirthaconsultancy
 
If you want to write a beautifully therapeutic and personal poem, t.pdf
 If you want to write a beautifully therapeutic and personal poem, t.pdf If you want to write a beautifully therapeutic and personal poem, t.pdf
If you want to write a beautifully therapeutic and personal poem, t.pdfamirthaconsultancy
 
If a random variable Y has a normal distribution, YN(8,16), whats th.pdf
 If a random variable Y has a normal distribution, YN(8,16), whats th.pdf If a random variable Y has a normal distribution, YN(8,16), whats th.pdf
If a random variable Y has a normal distribution, YN(8,16), whats th.pdfamirthaconsultancy
 
If a healthy person drinks an excessive amount of water, which of fol.pdf
 If a healthy person drinks an excessive amount of water, which of fol.pdf If a healthy person drinks an excessive amount of water, which of fol.pdf
If a healthy person drinks an excessive amount of water, which of fol.pdfamirthaconsultancy
 
If a cell that has been isolated from the root of a carrot is given t.pdf
 If a cell that has been isolated from the root of a carrot is given t.pdf If a cell that has been isolated from the root of a carrot is given t.pdf
If a cell that has been isolated from the root of a carrot is given t.pdfamirthaconsultancy
 
If a company uses the indirect method to determine net cash flows fro.pdf
 If a company uses the indirect method to determine net cash flows fro.pdf If a company uses the indirect method to determine net cash flows fro.pdf
If a company uses the indirect method to determine net cash flows fro.pdfamirthaconsultancy
 
If 2n=14, how many chromosomes are present in a cell that is in G0 .pdf
 If 2n=14, how many chromosomes are present in a cell that is in G0  .pdf If 2n=14, how many chromosomes are present in a cell that is in G0  .pdf
If 2n=14, how many chromosomes are present in a cell that is in G0 .pdfamirthaconsultancy
 
Identily it Venous Drainage of the Head and Neck zach vein draitis (.pdf
 Identily it Venous Drainage of the Head and Neck zach vein draitis (.pdf Identily it Venous Drainage of the Head and Neck zach vein draitis (.pdf
Identily it Venous Drainage of the Head and Neck zach vein draitis (.pdfamirthaconsultancy
 
Identify the ways in which neutrophils can destroy microbial Identify.pdf
 Identify the ways in which neutrophils can destroy microbial Identify.pdf Identify the ways in which neutrophils can destroy microbial Identify.pdf
Identify the ways in which neutrophils can destroy microbial Identify.pdfamirthaconsultancy
 
Identifying, analyzing, and predicting crises North Korea Nuclear.pdf
 Identifying, analyzing, and predicting crises North Korea Nuclear.pdf Identifying, analyzing, and predicting crises North Korea Nuclear.pdf
Identifying, analyzing, and predicting crises North Korea Nuclear.pdfamirthaconsultancy
 
Identify It Blood Vessels of the Upper and Lower LimbsIolevitiy i.pdf
 Identify It Blood Vessels of the Upper and Lower LimbsIolevitiy i.pdf Identify It Blood Vessels of the Upper and Lower LimbsIolevitiy i.pdf
Identify It Blood Vessels of the Upper and Lower LimbsIolevitiy i.pdfamirthaconsultancy
 
Identificar y enumerar las t�cnicas de motivaci�n. Explique cada un.pdf
 Identificar y enumerar las t�cnicas de motivaci�n. Explique cada un.pdf Identificar y enumerar las t�cnicas de motivaci�n. Explique cada un.pdf
Identificar y enumerar las t�cnicas de motivaci�n. Explique cada un.pdfamirthaconsultancy
 
Identify a service, manufacturing or retail company that interests.pdf
 Identify a service, manufacturing or retail company that interests.pdf Identify a service, manufacturing or retail company that interests.pdf
Identify a service, manufacturing or retail company that interests.pdfamirthaconsultancy
 
Identifique dos (2) recursos comunitarios y dos (2) redes comunitar.pdf
 Identifique dos (2) recursos comunitarios y dos (2) redes comunitar.pdf Identifique dos (2) recursos comunitarios y dos (2) redes comunitar.pdf
Identifique dos (2) recursos comunitarios y dos (2) redes comunitar.pdfamirthaconsultancy
 
i.Se observan cuatro clases de progenie F2 porque la recombinaci�n .pdf
 i.Se observan cuatro clases de progenie F2 porque la recombinaci�n .pdf i.Se observan cuatro clases de progenie F2 porque la recombinaci�n .pdf
i.Se observan cuatro clases de progenie F2 porque la recombinaci�n .pdfamirthaconsultancy
 
i) Regich depositories to thoir descriptions ii) Regional bank a) glo.pdf
 i) Regich depositories to thoir descriptions ii) Regional bank a) glo.pdf i) Regich depositories to thoir descriptions ii) Regional bank a) glo.pdf
i) Regich depositories to thoir descriptions ii) Regional bank a) glo.pdfamirthaconsultancy
 
I) La utilidad neta devengada a los accionistas, calculada despu�s .pdf
 I) La utilidad neta devengada a los accionistas, calculada despu�s .pdf I) La utilidad neta devengada a los accionistas, calculada despu�s .pdf
I) La utilidad neta devengada a los accionistas, calculada despu�s .pdfamirthaconsultancy
 
I am deeply distressed at the fact that I was not assigned to the new.pdf
 I am deeply distressed at the fact that I was not assigned to the new.pdf I am deeply distressed at the fact that I was not assigned to the new.pdf
I am deeply distressed at the fact that I was not assigned to the new.pdfamirthaconsultancy
 
Hydrosphere - Know the definitions of dew-point temp, specific humidi.pdf
 Hydrosphere - Know the definitions of dew-point temp, specific humidi.pdf Hydrosphere - Know the definitions of dew-point temp, specific humidi.pdf
Hydrosphere - Know the definitions of dew-point temp, specific humidi.pdfamirthaconsultancy
 

More from amirthaconsultancy (20)

II 5. The - basic - accounting concept that refers to - the .pdf
 II 5. The - basic - accounting  concept  that  refers  to - the  .pdf II 5. The - basic - accounting  concept  that  refers  to - the  .pdf
II 5. The - basic - accounting concept that refers to - the .pdf
 
Ifter reading and studying this chapter, the successful student shoul.pdf
 Ifter reading and studying this chapter, the successful student shoul.pdf Ifter reading and studying this chapter, the successful student shoul.pdf
Ifter reading and studying this chapter, the successful student shoul.pdf
 
If you want to write a beautifully therapeutic and personal poem, t.pdf
 If you want to write a beautifully therapeutic and personal poem, t.pdf If you want to write a beautifully therapeutic and personal poem, t.pdf
If you want to write a beautifully therapeutic and personal poem, t.pdf
 
If a random variable Y has a normal distribution, YN(8,16), whats th.pdf
 If a random variable Y has a normal distribution, YN(8,16), whats th.pdf If a random variable Y has a normal distribution, YN(8,16), whats th.pdf
If a random variable Y has a normal distribution, YN(8,16), whats th.pdf
 
If a healthy person drinks an excessive amount of water, which of fol.pdf
 If a healthy person drinks an excessive amount of water, which of fol.pdf If a healthy person drinks an excessive amount of water, which of fol.pdf
If a healthy person drinks an excessive amount of water, which of fol.pdf
 
If a cell that has been isolated from the root of a carrot is given t.pdf
 If a cell that has been isolated from the root of a carrot is given t.pdf If a cell that has been isolated from the root of a carrot is given t.pdf
If a cell that has been isolated from the root of a carrot is given t.pdf
 
If a company uses the indirect method to determine net cash flows fro.pdf
 If a company uses the indirect method to determine net cash flows fro.pdf If a company uses the indirect method to determine net cash flows fro.pdf
If a company uses the indirect method to determine net cash flows fro.pdf
 
If 2n=14, how many chromosomes are present in a cell that is in G0 .pdf
 If 2n=14, how many chromosomes are present in a cell that is in G0  .pdf If 2n=14, how many chromosomes are present in a cell that is in G0  .pdf
If 2n=14, how many chromosomes are present in a cell that is in G0 .pdf
 
Identily it Venous Drainage of the Head and Neck zach vein draitis (.pdf
 Identily it Venous Drainage of the Head and Neck zach vein draitis (.pdf Identily it Venous Drainage of the Head and Neck zach vein draitis (.pdf
Identily it Venous Drainage of the Head and Neck zach vein draitis (.pdf
 
Identify the ways in which neutrophils can destroy microbial Identify.pdf
 Identify the ways in which neutrophils can destroy microbial Identify.pdf Identify the ways in which neutrophils can destroy microbial Identify.pdf
Identify the ways in which neutrophils can destroy microbial Identify.pdf
 
Identifying, analyzing, and predicting crises North Korea Nuclear.pdf
 Identifying, analyzing, and predicting crises North Korea Nuclear.pdf Identifying, analyzing, and predicting crises North Korea Nuclear.pdf
Identifying, analyzing, and predicting crises North Korea Nuclear.pdf
 
Identify It Blood Vessels of the Upper and Lower LimbsIolevitiy i.pdf
 Identify It Blood Vessels of the Upper and Lower LimbsIolevitiy i.pdf Identify It Blood Vessels of the Upper and Lower LimbsIolevitiy i.pdf
Identify It Blood Vessels of the Upper and Lower LimbsIolevitiy i.pdf
 
Identificar y enumerar las t�cnicas de motivaci�n. Explique cada un.pdf
 Identificar y enumerar las t�cnicas de motivaci�n. Explique cada un.pdf Identificar y enumerar las t�cnicas de motivaci�n. Explique cada un.pdf
Identificar y enumerar las t�cnicas de motivaci�n. Explique cada un.pdf
 
Identify a service, manufacturing or retail company that interests.pdf
 Identify a service, manufacturing or retail company that interests.pdf Identify a service, manufacturing or retail company that interests.pdf
Identify a service, manufacturing or retail company that interests.pdf
 
Identifique dos (2) recursos comunitarios y dos (2) redes comunitar.pdf
 Identifique dos (2) recursos comunitarios y dos (2) redes comunitar.pdf Identifique dos (2) recursos comunitarios y dos (2) redes comunitar.pdf
Identifique dos (2) recursos comunitarios y dos (2) redes comunitar.pdf
 
i.Se observan cuatro clases de progenie F2 porque la recombinaci�n .pdf
 i.Se observan cuatro clases de progenie F2 porque la recombinaci�n .pdf i.Se observan cuatro clases de progenie F2 porque la recombinaci�n .pdf
i.Se observan cuatro clases de progenie F2 porque la recombinaci�n .pdf
 
i) Regich depositories to thoir descriptions ii) Regional bank a) glo.pdf
 i) Regich depositories to thoir descriptions ii) Regional bank a) glo.pdf i) Regich depositories to thoir descriptions ii) Regional bank a) glo.pdf
i) Regich depositories to thoir descriptions ii) Regional bank a) glo.pdf
 
I) La utilidad neta devengada a los accionistas, calculada despu�s .pdf
 I) La utilidad neta devengada a los accionistas, calculada despu�s .pdf I) La utilidad neta devengada a los accionistas, calculada despu�s .pdf
I) La utilidad neta devengada a los accionistas, calculada despu�s .pdf
 
I am deeply distressed at the fact that I was not assigned to the new.pdf
 I am deeply distressed at the fact that I was not assigned to the new.pdf I am deeply distressed at the fact that I was not assigned to the new.pdf
I am deeply distressed at the fact that I was not assigned to the new.pdf
 
Hydrosphere - Know the definitions of dew-point temp, specific humidi.pdf
 Hydrosphere - Know the definitions of dew-point temp, specific humidi.pdf Hydrosphere - Know the definitions of dew-point temp, specific humidi.pdf
Hydrosphere - Know the definitions of dew-point temp, specific humidi.pdf
 

Recently uploaded

Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 

Recently uploaded (20)

Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 

Identifying a relevant cyberattack that affect protocol behaviour and.pdf

  • 1. Identifying a relevant cyberattack that affect protocol behaviour and answer the questions indicated below: 1. Identify the protocol and cyberattack you have chosen. 2. Describe the selected protocol. In particular, identify the protocol, which layers it operates in the TCP/IP model, and what functionality this protocol provides in a computer network. 3. Explain the normal operation of the protocol relevant to the cyberattack you have chosen. 4. Identify and briefly explain the vulnerabilities in the protocol that have allowed the cyberattack to occur. 5. Describe the selected cyberattack. In particular, explain how the cyberattack invokes the vulnerabilities you identified in (4) and discuss the potential damage/impacts of the attack. Hints To understand the expectations of this task, consider a simple example of the TCP SYN Flood (cannot be used): in (2) you would explain what the TCP protocol is and what it's used for, in (3) you'd explain the TCP three-way handshake (targeted by the attack), in (4) you'd explain the problem with how operating systems reserved limited resources upon receiving a SYN request without validating/verifying the request, and for (5) you'd explain how the SYN flood actually works by sending many SYNs addressing the vulnerability identified in (4), resulting in resource exhaustion and Denial of Service.