Consider the following threats to Web security, anddescribe how each is countered by a particular feature ofSSL.
A.SYN Flooding: An attacker sends TCP SYN messages to request aconnection but does not respond to the final message to establishthe connection fully. The attacked TCP module typically leaves the”half-open connection” around for a few minutes. Repeated SYNmessages can clog the TCP module.
Expert Answer
An answer will be send to you shortly. . . . .