Wireless or mobile networks.

Research and Critical Thinking

  1. Identify two attacks that use wireless or mobile networks. Describe the attack and how it is implemented. What can be done to mitigate this type of attack?
  2. Research and describe two vulnerabilities presented by concepts discussed in the Multimedia Networking chapter. This may include, but is not limited to, streaming services, VoIP, or QoS.
  3. Describe the process of the Diffie-Hellman key exchange process. Draw out an example of how this exchange happens. This will consist of a graphical representation of the Diffie-Hellman process and a textual step by step description.
  4. You have been able to use Wireshark to see how your host and the web server is able to communicate securely. Research two attacks, one on the client side and one on the server / service side, can put the user or server at risk. Ensure that you identify which attack is associated with the client and which is associated with the server. What is that attack? How does the attack work? How can the client or server mitigate those attacks?
  5. Identify and describe three mechanisms that are used to create as secure connection with a web server.

Sample Solution