Security in (inter)network. 2 So far… We looked at the methods by which the denial of services (such as the delay the delivery of messages or denial of.