Posted: September 3rd, 2013
false sense of security
Problem R-1.16
Give an example of the
false sense of security that can come from using the security by obscurity” approach.
Problem C-1.2
Describe an instance of a file that contains evidence of its own integrity and authenticity.
Problem C-1.3
Suppose an
Internet service provider (ISP) has a voice over IP (VoIP) telephone system that it manages and sells. Suppose further that this ISP is deliberately dropping 25% of the packets used in its competitors VoIP system when those packets are going through this ISP’s routers. Describe how a user could discover that his ISP is doing this