Get a customized solution on this task at nursehomework.com

Pay someone to do my homework cheap. On nursehomework.com you can order your academic assignment from one of our 300+ project experts. Hire your expert directly, without overpaying for agencies and affiliates!
POST A QUESTION

Create a new topic for your response or respond to someone’s topics expanding upon it or challenging it.

Need your ASSIGNMENT done? Use our paper writing service to score better and meet your deadlines.


Order a Similar Paper Order a Different Paper

In this conference, we will focus on typical attacks in the Internet affecting confidentiality, integrity and availability. We will focus on the lower four layers: Layer 1, Physical; Layer 2, Link; Layer 3, Network; and Layer 4, Transport. Pick one layer and describe typical attacks in that layer and the controls that are employed in the layer to minimize the attack or vulnerability that leads to the attack. For example, in the link layer, there is ARP spoofing and man-in-the-middle attacks. In the IP layer, there is packet sniffing. In the transport layer, there is the SYN flood attack causing Denial of Service. Be as complete as possible and cite your reference materials in your response. You may create a new topic for your response or respond to someone’s topics expanding upon it or challenging it. We have not talked much about the physical layer. In physical layer, for example, an attacker can cut a cable or jam a wireless signal affecting availability or wiretap affecting confidentiality.