Question1. Illustrate the following security services: Confidentiality, Availability.
Question2. Describe the term “Known Plaintext” attack?
Question3. What do you understand by the phrases “Playback”, “Spoofing”?
Question4. Make a distinction between unconditional security and computational security.
Question5. Describe two limitations of steganography.
Question6. Describe the operation of Trojan horse program. How can we protect our computer from such a program?