1 if you were a malware designer would you rather use tcp


1. If you were a malware designer, would you rather use TCP or UDP to distribute a malicious payload and why?

2. Give an example of an Internet worm. What vulnerability does the worm you cited exploit? What were the attack effects of the worm you cited, if any? What is a practical defense against the worm you cited?

3. What is the TCP triple-handshake and how can it be used in an attack? Which leg of the CIA triad would this attack fall under?

Solution Preview :

Prepared by a verified Expert
Basic Computer Science: 1 if you were a malware designer would you rather use tcp
Reference No:- TGS01604330

Now Priced at $15 (50% Discount)

Recommended (98%)

Rated (4.3/5)