problem1. List all the five major security services.
problem2. What do you understand by the term passive attack? Provide an ex of passive attack?
problem3. What four types of active attacks and list all their respective attacks to which security services?
problem4. Make a distinction between authentication and non-repudiation.
problem5. Which type of algorithms can be used to provide the following security services?
i. Message integrity
ii. Message integrity and authentication
problem6. describe how public key cryptography can be employed to provide message confidentiality when Alice wants to communicate with Bob.