Chapter 1: Problem 28
Suppose Alice and Bob are sending packets to each other over a computer network. Suppose Trudy positions herself in the network so that she can capture all the packets sent by Alice and send whatever she wants to Bob; she can also capture all the packets sent by Bob and send whatever she wants to Alice. List some of the malicious things Trudy can do from this position.
Short Answer
Step by step solution
Key Concepts
These are the key concepts you need to understand to accurately answer the question.