Introduction to Cryptography - Old Questions
a. Suppose a key logger program intercepts user password and is
used to modify the user account. Now, justify whether it’s a violation of
confidentiality, integrity, or availability or some of combination of them.
2 marks
|
Asked in 2071