Question 1 Explain the following security attacks
a) IP Spoofing
b) Denial of Service Attack
Question 2 Explain the limitations and weaknesses of e-Commerce security measures
Question 3 Explain with an example how an ATM fraud Takes place
Question 4 What are the basic issues in secret key management? Explain in brief
Question 5 Explain distributed Flat key management approach