top of page

Internet Security

This is a short segment from a report that outlines the many different forms of cyber attack that can be performed on a vulnerable computer. To name a few would include hacking, hi-jacking and denial of service attacks

This diagram outlines the differences between the Ipv4 and the IpV6 header. I also created a table which further breaks down what task each of the components perform.

bottom of page