Initial exchanges of public keys are vulnerable to the man-in-the-middle attack. Describe as many
defences against it as you can.
What will be an ideal response?
1. Use a private channel for the delivery of initial keys, such as a CDROM delivered by hand or by some
other rellable method.
2. Include the Domain Name in the certificate and deal only with the correct corresponding IP address.
3. If certificates are delivered through the network, validate them with a ‘key fingerprint’ – a character
string that is derived from the key with a standard one-way function - that was delivered by a separate
channel (e.g. on a business card).
You might also like to view...
Where is it legal to put a break statement? What does the break do there?
a) A break is placed in a simple (unnested) loop, to terminate the loop. b) A break is placed in an inner block of nested blocks, to transfer control beyond the end of block the break is within. c) A break is placed in a loop in nested loops, to transfer control beyond the end of the innermost loop the break is within. d) A break is placed in a switch statement, to terminate the switch by transferring control beyond the end of the switch. e) A break is placed in a loop where it restarts the loop.
A list of points that is not sequential.
What will be an ideal response?
?The local loop commonly consists of either four or ____ wires.
A. ?six B. ?eight C. ?nine D. ?ten
Some human resources departments view college degrees from online diploma mills or other nonaccredited organizations as another form of digital manipulation.
Answer the following statement true (T) or false (F)