Mal is engaging in an IP spoofing attack against a target organization over the internet. Which one of the following limitations does the attack have, if Mal has complete control of her own network?
1) The attack can only be performed on devices within Mal's network
2) The attack can be easily detected by the target organization
3) The attack can bypass firewalls and intrusion detection systems
4) The attack can cause permanent damage to the target organization's network