Problem
a) Briefly Discuss the disadvantages of NIDPSs. Site your sources for references.
b) Discuss footprinting, which is one of the preparatory steps of an attack. Site your sources for references.
c) How are biometric technologies dependent on the use of cryptography? Site your sources for references.