What routing protocol is usually used on the Internet? Why is the information used by the protocol vulnerable to compromise?
What will be an ideal response?
The Internet network is linked by routers. Routing protocols such as Border Gateway Protocol (BGP) are used to communicate information updates for routing tables. However, routing information is not authenticated, so it is vulnerable to compromise. Attackers could send modified routing updates that misdirect data to a destination of their choosing. With this data, they can launch DoS attacks, use IP spoofing to intercept packets, or launch man-in-the-middle attacks, in which the attacker's computer or router is placed between the source and destination of a communication to intercept and steal information.
Computer Science & Information Technology