Identifying a relevant cyberattack that affect protocol behaviour and answer the questions indicated below: 1. Identify the protocol and cyberattack you have chosen. 2. Describe the selected protocol. In particular, identify the protocol, which layers it operates in the TCP/IP model, and what functionality this protocol provides in a computer network. 3. Explain the normal operation of the protocol relevant to the cyberattack you have chosen. 4. Identify and briefly explain the vulnerabilities in the protocol that have allowed the cyberattack to occur. 5. Describe the selected cyberattack. In particular, explain how the cyberattack invokes the vulnerabilities you identified in (4) and discuss the potential damage/impacts of the attack. Hints To understand the expectations of this task, consider a simple example of the TCP SYN Flood (cannot be used): in (2) you would explain what the TCP protocol is and what it's used for, in (3) you'd explain the TCP three-way handshake (targeted by the attack), in (4) you'd explain the problem with how operating systems reserved limited resources upon receiving a SYN request without validating/verifying the request, and for (5) you'd explain how the SYN flood actually works by sending many SYNs addressing the vulnerability identified in (4), resulting in resource exhaustion and Denial of Service..