✍️ Get Writing Help
Uncategorized

Chooses one attacks (from different layers) below and does independent study on the chosen topics. • Prepare detailed presentation (15 min) with power point slides • Describe the attack and the prevention

• Chooses one attacks (from different layers) below and does independent study on the chosen topics.

• Prepare detailed presentation (15 min) with power point slides

• Describe the attack and the prevention (or detection or mitigation) methods

• Please create original diagrams with Visio, http://draw.io, etc..

• All diagrams should be explained.

• This project is technical presentation which should be created in PowerPoint. Select a type of attack outlined in project description.

• Select an attack topic and build a presentation which will contain the following:

• How is the attack launched is it perpetrated by tools, social engineering, scripts, etc.. ?

• What type of target this attacks pinpoints switches, routers, etc..?

• What measures can be taken by an organization to stop the attacks such tools, device, etc.. ?

• Please provide background and statistics regarding the attack.

• Please site all resource utilized in APA format

https://apastyle.apa.org/ (utilize PDF for explanation)

1.     The port scanning or port enumeration techniques attacks

• SCTP Cookie Echo Scan

• Spear-phishing

• Banner grabbing

• Web-based Directory Enumeration Attack

• FTP bounce scanning

• ARP (Address Resolution Protocol) scan

• Vanilla attack

• SNMP Enumeration

2. Layer 2 attacks or lower layer attacks

• VLAN hopping,

• MAC address spoofing, MAC flooding

• Spanning-Tree Attack

• Jamming Attack

• Vulnerability on Neighbor Discovery Protocol (NDP)

• GARP Attacks/ARP poisoning

• Private VLAN Proxy Attack

• MAC flooding, MAC spoofing and ARP flood attacks

• Authentication/Association flood attack and deauthentication/disassociation

flood attack                                                                                                          —-

3.     Layer 3 (or Router) attacks

• DNS Rebinding and Route Table Poisoning

• Cross-Site Request Forgery (CSRF)

• Max Sequence Number Attack via OSPF

• BGP Router Attacks

• RIP Attack

• Heap and Stack Overflow Attacks

• DHCP Starvation/ DHCP Consumption Attack/DHCP Exhaustion Attack

• Peer-to-Peer and Smurf attacks

• Routing Table Modification and Denial of Service Attacks

• Denial of Service Attacks- SYN Floods

• OSPF and XSS attacks

admin

Expert academic writer and education specialist helping students in the UK, USA, and Australia achieve their best results.

Need help with your own assignment?

Our expert writers can help you apply everything you've just read — to your actual assignment.

Get Expert Help Now →
WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!
👋 Hi, how can I help?