1. Create an attack tree for sending e-mail as someone else. Here, the attacker goal is to convince an e-mail recipient that an e-mail she receives is from someone else (say, Bob), when in fad Bob never sent that e-mail.
2. Describe a concrete example, excluding the ones given in this chapter, where improving the security of a system against one type of attack can increase the likelihood of other attacks.