Question

Security Analysis of Layered Protocol Architectures 2 一一..→ | Layer 5 ? 1 Layer 4 ?一 1 Layer 3 ? Layer 2 Layer 1 Application

This is a question about securing wireless network, please give your answer and explain why, thank you so much.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

In which layer does the attack take place? The question might seem noob as each of these layers are vulnerable to different types of attacks and not only just one of them gets you access to a network or a system. I'll explain some major attacks in each of these layers and hope you'll find it useful. I wont be getting into the details of each layer but will be into the attacks.

Transport Layer: Transport layer of the osi model is vulnerable to Session Hijacking. The attacker takes control over the session between two nodes. The authentication of a session usually takes place when the session is being started and once the session has been established the attacker masquerades as one of the session and hijacks the session.

Application Layer: Application layer is vulnerable to Repudiation which is the denial of service.

Network Layer: It usually comes with a list of attacks. Some of the major attacks in this layer is, wormhole attack, blackhole attack, byzantine attack, information disclosure, routing attacks etc.

Besides these there is multilayer attacks which makes use of one or more layers to intrude into a network.

Add a comment
Know the answer?
Add Answer to:
This is a question about securing wireless network, please give your answer and explain why, thank...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • 1. How many hosts can reside on a single Class C network? 1. 65535 2. 256...

    1. How many hosts can reside on a single Class C network? 1. 65535 2. 256 3. 254 4. 127 2.   Select the invalid IP address 1. 95.31.0.15 2. 143.256.11.2 3. 24.123.33.60 4. 135.10.243.1 3. What layer in the TCP/IP protocol suite would a Web Browser reside? 1. Data Link 2. Application 3. Network 4. Physical 4. If I have developed a new type of network interface device - one that uses a new wireless technology, which layer of the...

  • 1) What is the protocol developed for the wireless network communications? Explain. A) Wireless Encryption Protocol...

    1) What is the protocol developed for the wireless network communications? Explain. A) Wireless Encryption Protocol (WEP) B) Wireless Application Protocol (WAP) C) Wired Equivalent Privacy (WEP) D) Wireless Session Protocol (WSP) 2) Consider 802.11 shared key authentication. Which of the following statements is false? Explain. A) If a device with the key is lost then the security for the entire WLAN is compromised. B) 802.1X requires shared key authentication. C) Real users and attackers with a shared WEP key...

  • Plz answer 27 to 40 flooding the network with 27. Which of the following is a...

    Plz answer 27 to 40 flooding the network with 27. Which of the following is a type of denial-of-service attack that involves broadcast messages that contain a spoofed source address of an intended victim? a. packet storm b. broadcast flood c. smurf attack d. half-open SYN attack 28. When would you most likely NOT choose to use a leased line connection? a. when high-quality, 24/7 access is needed b. for mission critical applications c. when fast upstream as well as...

  • QUESTION 1 Which generation of wireless network technology uses the packet-switched IP network? a. 3G b....

    QUESTION 1 Which generation of wireless network technology uses the packet-switched IP network? a. 3G b. 4G c. 5G d. All of the above 2.5 points    QUESTION 2 Which layer of the TCP/IP hierarchy is responsible for obtaining the correct address for a message’s destination? a. Application b. Link c. Network d. Transport 2.5 points    QUESTION 3 The UPDATE statement is used to update table names. True False 2.5 points    QUESTION 4 Which of the following is...

  • Chapter 18: wireless networks TRUE OR FALSE                                    

    Chapter 18: wireless networks TRUE OR FALSE                                                                                                     T          F          1. As the demand for broadband Internet access has grown, providers of wired local loop service have responded with increasing reliance   on optical fiber and coaxial cable. T          F          2. A BWA provider services one or more cells. T          F          3. Wireless systems are more expensive than wired systems. T          F          4. IEEE 802.16 and the associated WiMAX specification now deal with      both fixed and mobile BWA. T          F         ...

  • Question 1 The size of the datagram is determined by the application that sends the data....

    Question 1 The size of the datagram is determined by the application that sends the data. Allowing the size of datagrams to vary makes IP adaptable to a variety of applications. True False Question 2 What is the conceptual network boundary, and where is it located within the protocol stack? Is the transition area between digital and analog signals and can be found between layer 2 and layer 3 of the protocol stack. Identifies application direct messaging and is formed...

  • Answer the following questions to the best of your ability. PLEASE ANSWER ALL THIS FOR INFORMATION...

    Answer the following questions to the best of your ability. PLEASE ANSWER ALL THIS FOR INFORMATION TECHNOLOGY MANEGEMENT CLASS, THANK YOU 1) Which company has a higher degree of digitization, Amazon or E*Trade? 2) A reverse auction is common in this type of e-commerce. 3) If you use online bill pay though your bank, what type of electronic payment mechanism is your bank most likely using to transfer funds when executing a bill payment for a utility company? 4) A...

  • - Network security QUESTION 17 We assume that a LAN network includes 7 hosts (A, B,...

    - Network security QUESTION 17 We assume that a LAN network includes 7 hosts (A, B, C, D, E. Fand G) which are connected by a switch. The contents of the switch's CAM table is as follows: (Port 1. Host A) - (Port 2. Host B) - (Port 3. Host - Port 4, Host D) - Port S. Hosta-Port 6, Host F) - (Port 7. HostG), Also, we assume that there is/are one or many host(s) that has/have sent fake...

  • 1.DNS can not work if the hostnames are not hierarchal? Explain? 2. Give two scenarios where...

    1.DNS can not work if the hostnames are not hierarchal? Explain? 2. Give two scenarios where DNS protocols (from two hosts) gets two different IP address for the same hostname. 3. If you have a 100% reliable network layer, should you use TCP or UDP at the Transport layer? Explain your answer? 4.Is it is possible for an application on top of UDP to have a reliable data transfer? Explain? 5.Suppose that a Web server runs in Host C on...

  • In this lab, we’ll investigate the 802.11 wireless network protocol. Follow the instructions and answers questions...

    In this lab, we’ll investigate the 802.11 wireless network protocol. Follow the instructions and answers questions 7 - 10. http://gaia.cs.umass.edu/wireshark-labs/wireshark-traces.zip In this lab, we'll investigate the 802.11 wireless network protocol. Before beginning this lab, you might want to re-read Section 6.3 in the text. Since we l1 be delving a bit deeper into 802.11 than is covered in the text, you might want to check out "A Technical Tutorial on the 802.11Protocol," by Pablo Brenner (Breezecom Communications) http://www.sss-mag.com/pdf802_11tut.pdf, and "Understanding...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT