Mr. Love @ISM

Encryption Backdoors
Home
MYP Tech Criteria
MYP Tech Criteria (edit)
Yearbook Class
M1 Tech
M2 Tech
M3 Tech
M4 Tech
M5 Tech
Downloads
ITGS Home
ITGS Assessment and Schedule
ITGS Exercises and Assignments Part I
ITGS Exercises and Assignments Part II
ITGS Section I
ITGS Section II
ITGS Section III
Computer Abbreviations
Assessment Terms
ITGS Resource Links
About Me

Exercise 2.2.1.1 - Backdoors

Read the following article: Encryption backdoors: http://www.wired.com/news/conflict/0,2100,47635,00.html. You should be aware that backdoors can exist not only in software but also as viruses and spyware.

  1. Define what a 'software' or 'encryption backdoor' is. (2 marks)

  2. Why did some government officials call for backdoors on data scrambling products after 9/11? (2 marks)

  3. Describe 2 possible ethical implications of backdoors. (4 marks)

  4. Evaluate which is more important. (2 marks)

Enter supporting content here

Click here to email me with your comments and suggestions!

I hope this was a useful page for you!
Come again!