| Inline/Online: Fundamentals of the Internet and the World Wide Web, 2/e Raymond Greenlaw,
Armstrong Atlantic State University Ellen Hepp,
The University of New Hampshire
Privacy and Security Topics
Chapter 14 Exercises- Do you consider the manipulation and collection of information
from “public” databases an invasion of personal privacy? (section 14.2, problem 1)
- What does it mean to “crack” a password? What are some common techniques people use to try to crack passwords? (section 14.3, problem 8)
- Encode the message, “The credit card is in the bottom zippered part of my backpack,” using the private key cryptography scheme described in Section 14.4.3. Assume a private key of 7 and
ignore punctuation marks. (section 14.4, problem 12)
- Using the hashing algorithm described in Section 14.4.5, com-pute the message digests of the following messages:
- The far end is the deep end.
- You will find the money buried twenty paces north of the large
oak.
- Victoria is a spy. Keep under cover.
(section 14.4, problem 15)
- The Internet was originally an open system, and most informa-tion was available to everyone. Why is it more difficult to add
security to an existing system than it is to incorporate it from the
start? How has this affected Internet security? (section 14.5, problem 19)
- Contrast an in-person signature and a digital signature. Why
does a digital signature need to be more complex? (section 14.6, problem 24)
- In practice, how widely available are public encryption keys that are part of matched-key pairs? (section 14.6, problem 28)
- What is a proxy server? (section 14.7, problem 33)
|
|