After the first Gulf War ended in 1991, some generals realized that the Iraqi networks had been remarkably resilient. As soon as the Allies destroyed one station, the network promptly routed around it. The generals discovered that the Iraqis were using Internet routing protocols, which were designed for resiliency. Several promptly suggested that those protocols should be classified. What are the problems with doing this?
|
ECS 153, Computer Security Version of October 22, 2019 at 11:26PM
|
You can also obtain a PDF version of this. |