Explores BGP security weaknesses, real-world incidents, and defenses against BGP hijacking, emphasizing the importance of cryptography in securing routing information.
Explores botnets, networks of compromised hosts controlled by a single entity, and defense strategies against them, highlighting the impact of malicious software.