Problem R-1.16
Give an example of the false sense of security that can come from using the security by obscurity” approach.
Give an example of the false sense of security that can come from using the security by obscurity” approach.
Problem C-1.2
Describe an instance of a file that contains evidence of its own integrity and authenticity.
Describe an instance of a file that contains evidence of its own integrity and authenticity.
Problem C-1.3
Suppose an Internet service provider (ISP) has a voice over IP (VoIP) telephone system that it manages and sells. Suppose further that this ISP is deliberately dropping 25% of the packets used in its competitors VoIP system when those packets are going through this ISP’s routers. Describe how a user could discover that his ISP is doing this
Suppose an Internet service provider (ISP) has a voice over IP (VoIP) telephone system that it manages and sells. Suppose further that this ISP is deliberately dropping 25% of the packets used in its competitors VoIP system when those packets are going through this ISP’s routers. Describe how a user could discover that his ISP is doing this
No comments:
Post a Comment