Suppose that an intruder puts a virus on your computer that alters your browser. Describe two different ways that the intruder could then impersonate some server site S that you might attempt to communicate with—even though you use the SSL protocol—and obtain your credit card number.
What will be an ideal response?
Substitute the intruder’s public key for one of the CA’s and then forge and use a certificate for S signed with the intruder’s public key. Alternately, cause the browser to encrypt all messages with the intruder’s public key.
You might also like to view...
Answer the following statements true (T) or false (F)
1. An object identifier (OID) is a unique key for each record in the database, not just in a table. 2. Master files contain all the information about a data entity. 3. A master file contains information used to update master files and produce reports. 4. In database literature, the views are referred to as schema.
To emphasize patterns in data, you can add sparklines to your chart. _________________________
Answer the following statement true (T) or false (F)