Security of IP Routing Protocols
Before you complete your initial post, read Section 1.2 in this document: Security of IP Routing Protocols. In your post, analyze this question from the document: “If these companies had such a hard time getting it perfect, what chance does anyone else have?” Although this was written in 2001, many of the identified exploits still exist. If money hasn’t been the solution, what is? Justify a possible solution. Include network security and IP routing and configuration in your discussion.
In response to your peers, connect their solutions to the application of the CIA triad or fundamental design principles. For reference, refer to the CIA Triad and Fundamental Security Design Principles document.
To complete this assignment, review the Discussion Rubric document.
** Note I have attached the Rubric and the Security of IP routing protocols.