Review Questions
7.1 For a user workstation in a typical business environment, list potential locations for confidentiality attacks.
7.2 What is the difference between link and end-to-end encryption?
7.3 What types of information might be derived from a traffic analysis attack?
7.4 What is traffic padding and what is its purpose?
7.5 List ways in which secret keys can be distributed to two communicating parties.
7.6 What is the difference between a session key and a master key?
7.7 What is a nonce?
7.8 What is a key distribution center?
7.9 What is the difference between statistical randomness and unpredictability?