| 
                                    
                                    Read the following
                                    article: Encryption backdoors: http://www.wired.com/news/conflict/0,2100,47635,00.html. You should be aware that backdoors can exist not only in software but also as viruses and spyware. 
                                    
                                    Define
                                    what a 'software' or 'encryption backdoor' is. (2 marks)
                                    Why did some government officials call for backdoors on data scrambling products after 9/11? (2 marks)
                                    Describe 2 possible ethical implications of backdoors. (4 marks)
                                    Evaluate which is more important. (2 marks)
                                    
 |