Week 4 DQ 2
Write a 250- to 300-word short-answer response to the following: Network attacks come in many forms. Broadley, et al. (2009) point out a new method where the attacker creates a covert communication channel by changing the timing of part of a real signal and sneaking in. Analyze and discuss whether your system at work could be attacked by this methodology and if you think so what are you going to do about it?