Introduction to Cryptography - Old Questions

Question Answer Details

        a. Suppose a key logger program intercepts user password and is used to modify the user account. Now, justify whether it’s a violation of confidentiality, integrity, or availability or some of combination of them. 

2 marks
Asked in 2071

Answer

AI Generated Answer

AI is thinking...