1. Although we discussed several sources of security threats, we did not exhaust all. There are many such sources. Name and discuss five.
2. We pointed out that the design philosophy of the Internet infrastructure was partly to blame for the weaknesses and hence a source of security threats. Do you think a different philosophy would have been better? Comment on your answer.