Problem
1. What are the most common types of access rights?
2. How can auditing be used to protect a computer system from fraudulent use?
3. Describe a simple example of a substitution-based cipher.
4. Describe a simple example of a transposition-based cipher.
5. How can public key cryptography make systems safer?