Disrupt the Bottom of the Wall, and the Top Is Disrupted, Too

Everything at Layer 3 and higher is encapsulated into some type of Layer 2 frame. If the attacker can interrupt, copy, redirect, or confuse the Layer 2 forwarding of data, that same attacker can also disrupt any type of upper-layer protocols that are being used.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset