updates
This commit is contained in:
@@ -31,7 +31,7 @@ Domain names for the application/human layer
|
||||
|
||||
- E.g., www.wustl.edu
|
||||
|
||||

|
||||

|
||||
|
||||

|
||||
|
||||
|
||||
27
content/CSE4303/CSE4303_L4.md
Normal file
27
content/CSE4303/CSE4303_L4.md
Normal file
@@ -0,0 +1,27 @@
|
||||
# CSE4303 Introduction to Computer Security (Lecture 4)
|
||||
|
||||
## Network attacks
|
||||
|
||||
### Examining the transport layer
|
||||
|
||||
#### Transmission Control Protocol (TCP)
|
||||
|
||||
Connection-oriented, preserves order
|
||||
|
||||
- Sender
|
||||
- Break data into packets
|
||||
- Attach packet numbers
|
||||
- Receiver
|
||||
- Acknowledge receipt; lost packets are resent
|
||||
- Reassemble packets in correct order
|
||||
|
||||
#### Security Problems
|
||||
|
||||
1. Network packets pass by untrusted hosts
|
||||
- Eavesdropping, packet sniffing
|
||||
- Especially easy when attacker controls a machine close to victim (e.g. WiFi routers)
|
||||
2. TCP state easily obtained by eavesdropping
|
||||
- Enables spoofing and session hijacking
|
||||
3. Denial of Service (DoS) vulnerabilities
|
||||
|
||||
|
||||
@@ -6,4 +6,6 @@ export default {
|
||||
CSE4303_L1: "Introduction to Computer Security (Lecture 1)",
|
||||
CSE4303_L2: "Introduction to Computer Security (Lecture 2)",
|
||||
CSE4303_L3: "Introduction to Computer Security (Lecture 3)",
|
||||
CSE4303_L4: "Introduction to Computer Security (Lecture 4)",
|
||||
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user