Wednesday, September 4, 2013

false sense of security


Problem R-1.16
Give an example of the false sense of security that can come from using the security by obscurity” approach.
Problem C-1.2
Describe an instance of a file that contains evidence of its own integrity and authenticity.
Problem C-1.3
Suppose an Internet service provider (ISP) has a voice over IP (VoIP) telephone system that it manages and sells. Suppose further that this ISP is deliberately dropping 25% of the packets used in its competitors VoIP system when those packets are going through this ISP’s routers. Describe how a user could discover that his ISP is doing this

No comments:

Post a Comment