Tag: comuter security

Humman Traffic Essay Sample

Humman Traffic Essay Sample

… computer security specialists at the Black Hat Briefings security conference in Seattle about the Border Gateway Protocol’s security issues.
Dugan says that the Border Gateway Protocol currently allows the possibility of large quantities of network traffic to be misdirected. In allowing routers to tell their nearest neighbor the most efficient way to direct internet traffic from one place to another, the protocol forces a router to trust the information it receives.

Read More Read More

Humman Traffic Essay Example

Humman Traffic Essay Example

… computer security specialists at the Black Hat Briefings security conference in Seattle about the Border Gateway ProtocolÂ’s security issues.
Dugan says that the Border Gateway Protocol currently allows the possibility of large quantities of network traffic to be misdirected. In allowing routers to tell their nearest neighbor the most efficient way to direct internet traffic from one place to another, the protocol forces a router to trust the information it receives. This means that if a router is misconfigured or if someone violates the security of the router, the router could spread misinformation and misdirect large amounts of traffic that could possibly cause the networks to shut down. “Anyone at an internet service provider could do this,” Dugan told ZDNet News, an online technical reporting service. “We have to stop trusting routers.”

Read More Read More