1. Write the overview of the protocol you have selected. In particular, identify the protocol, which layers...
Question:
1. Write the overview of the protocol you have selected. In particular, identify the protocol, which layers it operates in the TCP/IP model, and what functionality this protocol provides in a computer network.
2. Explain the normal operation of the protocol relevant to the cyberattack you have chosen.
3. Identify and briefly explain the vulnerabilities in the protocol that have allowed the cyberattack to occur.
4. Write the overview of the cyberattack you have selected. In particular, explain how the cyberattack invokes the vulnerabilities you identified in (3) and discuss the potential damage/impacts that may result from the attack.
Note: In explaining the operation of protocols and cyberattacks it is often useful to include a diagram to illustrate the contents or exchange of packets. Such diagrams can be added as appendices to your submission and will not count towards the page limit (you must refer to/explain the diagrams within the page limit for them to be considered however). Examples of appropriate diagrams are included in the unit content and most textbooks on networks