Describe three vulnerabilities associated with TCP communication and UDP communication. o What can be done to mitigate or prevent these vulnerabilities from being exploited? o Describe the benefits of using TCP over UDP. o Why is there a need to use UDP? Compare and contrast two ways in which a TCP connection ends: o Graceful shutdown o Abrupt shutdown Identify an attack that uses ICMP. o Describe the attack and how it is implemented. o What can be done to mitigate this type of attack? Describe three reasons why a ping command would not work when trying to reach a destination. Identify one attack that uses ARP or attacks the networks Link Layer. o Describe these attacks and provide a real-world example for each of these attacks. A real-world example means that it has occurred. Research how you could change the MAC address on a system. Describe the following: o The process for changing the MAC address. o How would an attacker use this for nefarious purposes? o Describe a situation where this has occurred. This is another example of an attack in a lab setting or in the wild USE AS ONE OF THE SOURCES: Kurose, J. F., & Ross, K. W. (2017). Computer Networking: Principles and Practice. Pearson.
Subject: Do My assignment