Submit a discussion that shares your own research findings on TCP hijacking, how it is accomplished and common defences and prevention measures. List common defences against TCP hijacking and describe the steps network professionals can take to prevent intruders seeking unauthorized access.