(a) Show four Network Security attacks. How do they compromise security?
(b) In what ways do the following devices or services contribute to security:
(i) Firewall
(ii) Intrusion Detection System (IDS)
(iii) Secure Socket Layer (SSL)
(c) What are the objectives of access control? Give four examples of such systems.
(d) An attacker has the intention of disrupting secure communications by inserting bogus packets in the channel. Discuss how such an attack would succeed in systems protected by IP Sec and SSL.