Introduction to Cryptography - Old Questions
Question Answer Details
a. Suppose a key logger program intercepts user password and is
used to modify the user account. Now, justify whether it’s a violation of
confidentiality, integrity, or availability or some of combination of them.
Answer
AI Generated Answer
AI is thinking...