Читать книгу Industrial Internet of Things (IIoT) - Группа авторов - Страница 35

2.3.2.2 Access Layer

Оглавление

Eavesdropping, dishonest packets injections, and conversations that are not authorized are some of the major weaknesses. Based on the routing assaults, an assailant can try spoofing, redirecting, misdirecting, or drop packets.

Industrial Internet of Things (IIoT)

Подняться наверх