What routing protocol is usually used on the Internet?  Why is the information used by the protocol vulnerable to compromise?

What will be an ideal response?


The Internet network is linked by routers. Routing protocols such as Border Gateway Protocol (BGP) are used to communicate information updates for routing tables. However, routing information is not authenticated, so it is vulnerable to compromise. Attackers could send modified routing updates that misdirect data to a destination of their choosing. With this data, they can launch DoS attacks, use IP spoofing to intercept packets, or launch man-in-the-middle attacks, in which the attacker's computer or router is placed between the source and destination of a communication to intercept and steal information.

Computer Science & Information Technology

You might also like to view...

After opening a database, the Navigation Pane opens on the left side of the screen.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

English is the only language used on the Web.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

In some cases, an intermediary device, usually a router, will need to split up a packet when for warding it from one media to a media with a smaller maximum transmission unit (MTU). What is this process called?

What will be an ideal response?

Computer Science & Information Technology

Which of the following is not a type of synchronous protocol?

a. SDLC b. VT100 c. HDLC d. Ethernet e. PPP

Computer Science & Information Technology