Computer Networks and Vulnerabilities
Dr. Wei Chen discusses computer network vulnerabilities in three main areas: the network layer, transport layer, and hands-on experiments. The document outlines IP spoofing, routing attacks, and ICMP attacks that can occur in the network layer. It also discusses protection of confidentiality, integrity, and authentication using cryptography in the transport layer. Dr. Chen provides an outline of hands-on experiments to demonstrate IP packets, IP routing, IP spoofing, TCP SYN flooding, and traffic analysis.