Suppose that an intruder puts a virus on your computer that alters your browser. Describe two different ways that the intruder could then impersonate some server site S that you might attempt to communicate with—even though you use the SSL protocol—and obtain your credit card number.
What will be an ideal response?
Substitute the intruder’s public key for one of the CA’s and then forge and use a certificate for S signed with the intruder’s public key. Alternately, cause the browser to encrypt all messages with the intruder’s public key.
You might also like to view...
How many borders would the string BABBAB have?
a. 3 b. 0 c. 2 d. 1
Once a final version of a document has been accepted, it is a good idea to save it with a new name and delete the document with the tracked changes
Indicate whether the statement is true or false
What are four useful indicators of software quality that should have measures defined and monitored by the software project team?
What will be an ideal response?
Discuss the difference between the way Access saves a record and the way Excel saves a row in a worksheet.
What will be an ideal response?