# temp

things to review

1. On-path attack
2. Distributed denial of service attack (DDoS)
3. Denial of service attack (DoS)
4. SYN flood attack
5. IP spoofing
6. Packet sniffing