Cyber Attacks And Defense Lecture 10 - Rop