Suppose that an intruder puts a virus on your computer that alters your browser. Describe two different ways that the intruder could then impersonate some server site S that you might attempt to communicate with—even though you use the SSL protocol—and obtain your credit card number.

What will be an ideal response?


Substitute the intruder’s public key for one of the CA’s and then forge and use a certificate for S signed with the intruder’s public key. Alternately, cause the browser to encrypt all messages with the intruder’s public key.

Computer Science & Information Technology

You might also like to view...

How many borders would the string BABBAB have?

a. 3 b. 0 c. 2 d. 1

Computer Science & Information Technology

Once a final version of a document has been accepted, it is a good idea to save it with a new name and delete the document with the tracked changes

Indicate whether the statement is true or false

Computer Science & Information Technology

What are four useful indicators of software quality that should have measures defined and monitored by the software project team?

What will be an ideal response?

Computer Science & Information Technology

Discuss the difference between the way Access saves a record and the way Excel saves a row in a worksheet.

What will be an ideal response?

Computer Science & Information Technology