Why is cryptography alone insufficient to protect network traffic?
What will be an ideal response?
Cryptography is a great tool, but it can only provide message confidentiality (meaning that anyone who is not authorized cannot read the message).The easiest way to address this question is to look at what attacks are still possible on an encrypted message.For instance, a message can be replayed at a later time to reestablish an old session.A message can be intentionally modified to result in gibberish at the recipient machine. (This is particularly bad if the message contains bits of a key that will then be used for further communication and may not easily be determined to be nonsense.)An attacker can also sit between two hosts (called a man-in-the-middle attack) and intervene in the establishment of a session key and send and receive as both parties, eavesdropping on all the network traffic.A variety of scenarios can be presented based on the topics of the chapter.A good exercise is to have students identify the technique that is needed in addition to cryptography to solve the problem presented.The depth of the solution should be commensurate with the chapter content, only without deep explanations in the field of security.
You might also like to view...
Write a script that blurs images and slowly unblurs them when they are finished loading into the browser (use event ON- LOAD for the image).
What will be an ideal response?
Posters and banners can be created in PowerPoint by using a custom-sized single slide
Indicate whether the statement is true or false
The process of moving a slide object to a new location using the mouse pointer is called _____.
A. drop and drag B. drag and drop C. drag and drip D. drip and drop
Which of the following terms is defined as the time that the client begins to broadcast a renewal request for an extended lease time from another DHCP server.
A. R1 B. T2 C. T1 D. R2