IPSec has built-in protection for numerous different kinds of attacks. Several of these attacks are mentioned at various points in the reading, but they are spread out and difficult to keep organized in their current form. You need to create a table that summarizes the different attack methods. This is one way to gain traction on your study of the threats and countermeasures. Create a table that contains three columns: Name, Description, and Countermeasures. In the Name column, list the names of all the attacks you can find in the reading. In the Description column, provide a corresponding description of each attack listed in the Name column. In the Countermeasures column, provide a short description of how IPSec protects against the corresponding threat.
The attached PowerPoint contains the reading material from which you have to gather the different attack methods from and create the table on.