In this conference, we will focus on typical attacks in the Internet affecting confidentiality, integrity and availability. We will focus on the lower four layers: Layer 1, Physical; Layer 2, Link; Layer 3, Network; and Layer 4, Transport. Pick one layer and describe typical attacks in that layer and the controls that are employed in the layer to minimize the attack or vulnerability that leads to the attack. For example, in the link layer, there is ARP spoofing and man-in-the-middle attacks. In the IP layer, there is packet sniffing. In the transport layer, there is the SYN flood attack causing Denial of Service. Be as complete as possible and cite your reference materials in your response. You may create a new topic for your response or respond to someone’s topics expanding upon it or challenging it. We have not talked much about the physical layer. In physical layer, for example, an attacker can cut a cable or jam a wireless signal affecting availability or wiretap affecting confidentiality. You need to dig up sources on the physical layer security.
Order your paper at EssayAgents.com - Let our academic writing experts help you write a custom paper on a topic of your choice now within the shortest time possible. We are the most affordable writing service online- Click on the order now button for an instant quote. We guarantee 100% authenticity of all papers written by us. Boost your grades with our expert writing services.