Problem 37
Exercises 28-55 are problems or shortanswer questions. What is Apple's Touch ID technology used for?
Problem 38
Exercises 28-55 are problems or shortanswer questions. What do we mean when we say a computer virus is self-replicating?
Problem 39
Exercises 28-55 are problems or shortanswer questions. Describe the two techniques used by antivirus software to identify malware.
Problem 40
Exercises 28-55 are problems or shortanswer questions. Describe a hypothetical scenario, other than the one described in this chapter, of a phishing attack.
Problem 41
Exercises 28-55 are problems or shortanswer questions. Describe how a Trojan horse attacks a computer system.
Problem 42
Exercises 28-55 are problems or shortanswer questions. Describe a buffer overflow and how it might make a computer system vulnerable.
Problem 43
Exercises 28-55 are problems or shortanswer questions. How does a man-in-the-middle attack work?
Problem 44
Exercises 28-55 are problems or shortanswer questions. Using a Caesar cipher, shifting three letters to the right, encrypt the message "WE ESCAPE TONIGHT."
Problem 47
Exercises 28-55 are problems or shortanswer questions. Describe how Claire would send a message to David using public-key encryption.
Problem 48
Exercises 28-55 are problems or shortanswer questions. What is a digital signature?