Question: Suppose Alice and Bob are sending packets to each other over a computer network. Suppose Trudy (Intruder) positions herself in the network so that she can capture all the packets sent by Alice and send whatever she wants to Bob; she can also capture all the packets sent by Bob and send whatever she wants to Alice. List some of the malicious things Trudy can do from this position.