2. Module 4 does a very nice job in outlining the main concerns regarding TCP and IP protocol vulnerabilities. One vulnerability that I find that could have been enhanced, and discussed is the Domain Name System Spoofing (DNS). During the DNS attack, an attacker is able to acquire the DNS from a legitimate site and communicate with the victim computer and redirect traffic to the attackers server. There are many different techniques and software available to assist network administrators with the identification and mitigation of DNS spoofing. A technique, and process that may assist in the detection of a DNS spoofing attack is the LOT: A defense against IP spoofing and flooding attacks. LOT is a system developed by Gilad and Herzberg (2012) and has the ability to conduct a "tunnel" pathway that has the ability to detect malicious packets (Gilad, Herzberg 2012). These tunnels are positioned and ensure that an attacker does not have the ability to interject and "answer" with a bogus DNS. The programed "tunnel" would secure the traffic between the Domain Server and potential victim. The "tunneling" concept regarding packeging packets and creating a tunnel like process, appears to be succesful in both small and large organizations. The key behind tunneling is that an attacker does not have open access to obtain and provide a spoofed DNS to a victim computer.