0
2.2kviews
IT Cryptography & Network Security Module 5.1
1 Answer
| written 7.2 years ago by |
Subject: Cryptography & Network Security
Topic: Module 5
Difficulty: Medium/High
$\underline{\textbf{TCP Vulnerabilities (layerwise)}}$
![[m5-1]](https://i.imgur.com/COrhHns.jpg)
1. Application Layer
Protocols used: HTTP, FTP, telnet, SMTP, DHCP
a) HTTP: we communicate to the internet via a web browser, the web browser by default use HTTP as a communication protocol to transfer files that …