1. You have a computer at home with a wireless NIC and wireless router. List all the security measures that should be employed so that your home network is secure.
2. How does the size of a key affect the strengths and weaknesses of an encryption technique? Consider both a friendly use of the key and an unfriendly use of the key.
3. You are using a web browser and want to purchase a music CD from an electronic retailer. The retailer asks for your credit card number. Before you transfer your credit card number, the browser enters a secure connection. What sequence of events created the secure connection?