equal
deleted
inserted
replaced
6 \section*{Homework 5} |
6 \section*{Homework 5} |
7 |
7 |
8 \HEADER |
8 \HEADER |
9 |
9 |
10 \begin{enumerate} |
10 \begin{enumerate} |
|
11 \item Imagine you are researching security products |
|
12 (e.g.~CCTV, alarms etc) on a helpful website. They ask |
|
13 you for your address details? Think about whether this |
|
14 can be bad for you. |
|
15 |
|
16 |
11 \item What can attacker that controls the network do to a communication |
17 \item What can attacker that controls the network do to a communication |
12 between a client and a server? |
18 between a client and a server? |
13 |
19 |
14 \item Before starting a TCP connection, client and servers |
20 \item Before starting a TCP connection, client and servers |
15 perform a three-way handshake. Describe how can this three-way |
21 perform a three-way handshake. Describe how can this three-way |