Consider the security of your personal computer list the


1. Describe a protocol you engage in on a regular basis. This might be ordering a drink at a local coffee shop or boarding an airplane. Who are the explicit actors directly involved in this protocol? Are there other actors involved peripherally in this protocol, such as during the setup phase? For simplicity, list at most 5 actors. Create a matrix, where each row is labeled by an actor and each column is labeled by an actor. For each cell, describe how the actor in the row trusts the actor in the column.

2. Consider the security of your personal computer. List the attackers who might break into your computer, their incentives, and the associated costs and risks to the attacker.

Request for Solution File

Ask an Expert for Answer!!
Basic Computer Science: Consider the security of your personal computer list the
Reference No:- TGS01665313

Expected delivery within 24 Hours