problem1. What is the advantage of using groups for access control?
problem2. Describe the following threats to firewalls:
(I) Denial of service,
(II) IP Spoofing and
What countermeasures can be adopted against these threats?
problem3. IPSec uses two protocols for security: Authentication protocol (AH) and the Encapsulated Security Header Protocol (ESP). Why is AH used with ESP although ESP provides some authentication?
problem4. What is a Security Association (SA) and what does it define? Why are there two SAs per one connection? How can two communicating peers agree on what kind of SAs they use?
problem5. List 3 schemes for email security.
problem6. Give an ex of a symmetric encryption algorithm is used by PGP?
problem7. What algorithm is used by PGP for email compatibility and why?
problem8. SET allows the merchant to view only the order information and not to have access to the payment information. Similarly, the payment gateway gets access only to the payment information. describe how this can be achieved using a dual signature and public key cryptography.