McGraw-Hill OnlineMcGraw-Hill Higher EducationLearning Center
Student Center | Instructor Center | Information Center | Home
Non-Chapter Glossary Terms
Non-Chapter Flashcards
Frequently Asked Questions
Student Message Board
Learning Objectives
Chapter Outline
Key Terms
Flashcards
Interactive Activities
Exercises
Multiple Choice Quiz
Feedback
Help Center


Inline Online
Inline/Online: Fundamentals of the Internet and the World Wide Web, 2/e
Raymond Greenlaw, Armstrong Atlantic State University
Ellen Hepp, The University of New Hampshire

Privacy and Security Topics

Chapter 14 Exercises

  • Do you consider the manipulation and collection of information from “public” databases an invasion of personal privacy? (section 14.2, problem 1)
  • What does it mean to “crack” a password? What are some common techniques people use to try to crack passwords? (section 14.3, problem 8)
  • Encode the message, “The credit card is in the bottom zippered part of my backpack,” using the private key cryptography scheme described in Section 14.4.3. Assume a private key of 7 and ignore punctuation marks. (section 14.4, problem 12)
  • Using the hashing algorithm described in Section 14.4.5, com-pute the message digests of the following messages:
    1. The far end is the deep end.
    2. You will find the money buried twenty paces north of the large oak.
    3. Victoria is a spy. Keep under cover.
    (section 14.4, problem 15)
  • The Internet was originally an open system, and most informa-tion was available to everyone. Why is it more difficult to add security to an existing system than it is to incorporate it from the start? How has this affected Internet security? (section 14.5, problem 19)
  • Contrast an in-person signature and a digital signature. Why does a digital signature need to be more complex? (section 14.6, problem 24)
  • In practice, how widely available are public encryption keys that are part of matched-key pairs? (section 14.6, problem 28)
  • What is a proxy server? (section 14.7, problem 33)