It was in the middle of the night when your grandma phoned you, agitated and concerned. As a result of her computer screen being frozen, she is unable to use her computer until she gives someone some money. Fortunately, you were able to solve the issue quickly. This time she was much more concerned and anxious than before. Since the email originated from her bank, she provided someone her social security number! Can you really blame her? In order to obtain an adversary's IP address, you need to trace the DNS back to the email account's DNS. It's time to pay back! As a warning, you send 1 million fake TCP requests. In the given situation, how many distinct kinds of assaults occurred? In your own words, name and describe each of them.
Transmission Delay
Data is an essential part of network communication. To effectively transmit data through all kinds of networks, it must be streamlined into smaller data packets. Instead of sending a whole file to the other side, these variably-sized packets are sent across the network path to reduce transmission latency. Once they reach their destination, these packets are reconstructed into a complete file. This process is called packet-switching.
Coding Theory
Code is an alternative representation of some information—like a word, image, sound, and so on—that follows a set of rules. While coding theory may refer to the practice of studying such codes and their applications, in recent years, the term pertains to error-correcting codes.
It was in the middle of the night when your grandma phoned you, agitated and concerned. As a result of her computer screen being frozen, she is unable to use her computer until she gives someone some money. Fortunately, you were able to solve the issue quickly. This time she was much more concerned and anxious than before. Since the email originated from her bank, she provided someone her social security number! Can you really blame her? In order to obtain an adversary's IP address, you need to trace the DNS back to the email account's DNS. It's time to pay back! As a warning, you send 1 million fake TCP requests.
In the given situation, how many distinct kinds of assaults occurred? In your own words, name and describe each of them.
Step by step
Solved in 2 steps