A network protocol is an established set of rules that determine how data is transmitted between different: cyber security Assignment, UCD, Ireland
University | University College Dublin (UCD) |
Subject | cyber security Assignment |
Assessment 2 — Exercise 3 Network Protocol Exploitation
A network protocol is an established set of rules that determine how data is transmitted between different devices in the same network. Essentially, it allows connected devices to communicate with each other, regardless of any differences in their internal processes, structure, or design.
Task:
Select any two of the protocols from the table below and demonstrate their malicious exploitation.
[ONS | DomainName System Protocol =
[ARP _| Address Resolution protocol
|SSH__|SecureShellProtocol
You should also discuss different scenarios in which the selected protocols can be exploited. For instance, if you have selected TCP then you should mention at least one scenario in which the TCP protocol can be exploited for malicious activities such as DDOS, DOS, Spoofing, data exfiltration, scanning, man-in-the-middle attack, etc. The screenshot of the demonstrations should be provided along with an explanation of exploitation scenarios.
The Portfolio as a whole is 2400 words equivalent with a +10% flexibility. As the portfolio has 4 parts, the aim of this exercise is roughly 600 words equivalent, though the word count of each exercise is not strictly controlled.
Are You Searching Answer of this Question? Request Ireland Writers to Write a plagiarism Free Copy for You.
Empower your academic path at University College Dublin (UCD), Ireland, with our specialized services. We offer top-notch online assignment writing assistance and impeccable Literature Review Writing Services. Let our experts guide you through cyber security assignments, ensuring a seamless understanding of network protocols. Elevate your academic journey with our tailored support—your success is our priority.