1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pavel [41]
3 years ago
7

In the context of securing TCP/IP environment, provide a brief discussion on typical TCP/IP attacks, exploits and break-ins

Computers and Technology
1 answer:
olga_2 [115]3 years ago
5 0

When we talk about TCP/IP, we are talking about a protocol suite designed as a layered approach and used to interconnect computing devices across the entire continent. Internet Protocol (IP) is like the epitome protocol of the entire TCP/IP protocol suite and helps in the delivery of services. This IP is encapsulated into an IP header before your message is sent. Having briefly discussed about the IP protocol and the encapsulation, here is where typical TCP/IP attacks occur.

Explanation:

  • IP address spoofing – As mentioned above, IP is encapsulated into packet headers and inside of those headers are information such as IP source and destination addresses. IP source and destination addresses are needed by the routers to determine the best route path. If hackers can get access to the IP layer, they could easily spoof the source address and somehow make it pretend as if it was another legit host.
  • TCP sequence number prediction attack– This is very common. TCT/IP protocol suite contains a three way handshake. For instance, when you do a web search, what is happening is that you are sending information to the server. The server will receive this info and send an acknowledgment receipt with the information it received back to you. You will then send an acknowledgment message to the server and communication will be established. In between this handshake, there is a sequence number called ISN that hackers are able to predict from their own host computers, and this sequence number could send malicious packets to impersonate another source host on a network.
  • Port Scanning – It is not a technique used to directly launch an attack. However, hackers can use port scanning to scan a target network for exploitable open ports or listening servers.

Learn more about cyber security

brainly.com/question/10889739

brainly.com/question/11111886

brainly.com/question/8603826

#LearnWithBrainly

You might be interested in
This tag element is the last one used in the html code sequence
satela [25.4K]

Answer:

Looking closely at the HTML code sequence, it does seem that the tag element is the endpoint from where the HTML form gets the input, like input boxes, checkboxes, radio buttons, etc. And hence it is correct to say that the tag elements are the last one used in the HTML code sequence. And in the HTML code sequence head title script and styles comes at the top, and hence we mention the script or the Javascript code basically at the last, such that the HTML code or the web page run one time at least.

Explanation:

Please check the answer section.

3 0
4 years ago
On your Web page, you include various links and clickable images that have the ability to trigger various functions when users c
denis23 [38]

Answer:

Event is the correct answer to the given question.

Explanation:

Because when user clicks from the mouse on the image or any link then the clickable event triggered the various function. Event one of the essential part of DOM. It is an important event in the JavaScript. When the left button of the mouse is clicked on the images or links which are clickable then the mouseup event occurs.

HTML contains the set if an events when the user click on the clickable events then the JavaScript code are triggered

4 0
4 years ago
Why hackers hack?? in other people?​
pshichka [43]
Could you please reword this question. i don’t get what you’re asking
8 0
3 years ago
Read 2 more answers
What is the other name for repetitive strain injury
Ostrovityanka [42]

Carpel Tunnel syndrome, is what it is called in the USA


Hope it helped!

4 0
3 years ago
Read 2 more answers
What are the benefits of writing functions that use parameters and return List 2 please and explain what is return
Ratling [72]

<u>Answer and explanation:</u>

There are many benefits of writing functions that use parameters and return. Some of them are:

1. Flexibility: With functions having parameters, several values of the parameters can be used at invocation time thereby making the application flexible. For example, given the following function in Java.

<em>public void showName(String name){</em>

<em>    System.out.println("Your name is " + name);</em>

<em>}</em>

To call this method (function), the programmer could use various values for the name parameter used in the function like so:

showName("John");

showName("Doe");

If the function didn't have a parameter, it is possible it will only print a hardcoded name every time the function is called.

2. Scope Control: When a function is allowed to return a value, it helps to work around scope issues since variables declared within a function are limited to that function and do not exist outside the function. This means that the values of these variables cannot be used anywhere else outside the function in which they are being declared. However, if the function returns a value, the value can be used anywhere else in the program.

For example:

<em>public String getDouble(int x){</em>

<em>    int y = x * 2</em>

<em>    return y;</em>

<em>}</em>

The function above returns twice the value of the argument supplied to it. Since the integer variable y is declared within the function, it's value cannot be used outside the function. However, since the value is being returned by the function, it could be used anywhere the function is being called. Thanks to the return keyword.

3 0
3 years ago
Other questions:
  • A document that promises to pay specified sums of money on specified dates and is a debt to the issuer is called
    14·1 answer
  • Ill give Brainliest!!!!! I REALLYYY NEED HELP
    14·2 answers
  • Patti would like more information about product recalls. Which of the following resources would not be reliable and relevant? ww
    12·2 answers
  • What kind of device is a printer? output or input
    13·1 answer
  • 3. Run the C-LOOK algorithm (requests can only be serviced when the head is moving toward higher numbered tracks); the head is c
    11·1 answer
  • Which of the following is an advantage of batch processing?
    8·1 answer
  • What is one of the first power tools you’ll need as electrician
    15·1 answer
  • What the best option if you cant show your PowerPoint presentation at all
    6·2 answers
  • after landing, you are tying down the aircraft when a person approaches and asks: "faa. are you the pilot of this aircraft?" wha
    11·1 answer
  • 5. What are some situations where you might find it useful to use the “!” symbol in a program?
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!