Answered step by step
Verified Expert Solution
Question
1 Approved Answer
1) Briefly describe the following terms: Threat, Vulnerability, Exploit, Safeguard, and Target. How are they are linked together (ie What is the goal?). Linkage to
1) Briefly describe the following terms: Threat, Vulnerability, Exploit, Safeguard, and Target. How are they are linked together (ie What is the goal?). Linkage to each other
2) What is the purpose of a username? password? What is two factor authentication? Provide an example of two factor authentication. Describe biometrics. What is two factor authentication? Use two means to authenticate including something you have (phone), something you know(password), and something you are (face/fingerprint recognition).
3) What is a perimeter firewall vs an internal firewall vs a host based firewall? What is Defense in Depth?
4) What is encryption? (1pt) What are the two forms of data encryption? Briefly describe each. What are the two forms of data encryption?
Data at rest: Encrypting hard drives and usb sticks so that only the user can access data
Data in Motion: Secure network communications
Virtual private networks (VPNs) - Use of public internet for secure communications
HTTPS for web traffic.
5) Briefly describe the 5 steps for symmetric encryption as it pertains to secure websites.
Briefly describe the 5 steps for symmetric encryption for websites
1. Your computer obtains public key of Web site to which it will connect.
2. Your computer generates a key for symmetric encryption.
3. Your computer encodes key using Web site's public key, then sends encrypted symmetric key to Web site.
4. Web site decodes symmetric key using its private key.
5. Now, your computer and Web site communicate using symmetric encryption.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started