problem1. Illustrate the five main security services.
problem2. What is passive attack? Give an instance of passive attack?
problem3. What four types of active attacks and illustrate their respective attacks to which security services?
problem4. Make a distinction between non-repudiation and authentication.
problem5. Which type of algorithms can be used to offer the following security services?
i. Message integrity
ii. Message integrity and authentication
problem6. describe how public key cryptography can be used to offer message confidentiality when Alice wants to communicate with Bob.