Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

1) Briefly describe the following terms: Threat, Vulnerability, Exploit, Safeguard, and Target. How are they are linked together (ie What is the goal?). Linkage to

1) Briefly describe the following terms: Threat, Vulnerability, Exploit, Safeguard, and Target. How are they are linked together (ie What is the goal?). Linkage to each other
2) What is the purpose of a username? password? What is two factor authentication? Provide an example of two factor authentication. Describe biometrics. What is two factor authentication? Use two means to authenticate including something you have (phone), something you know(password), and something you are (face/fingerprint recognition).
3) What is a perimeter firewall vs an internal firewall vs a host based firewall? What is Defense in Depth?
4) What is encryption? (1pt) What are the two forms of data encryption? Briefly describe each. What are the two forms of data encryption?
Data at rest: Encrypting hard drives and usb sticks so that only the user can access data
Data in Motion: Secure network communications
Virtual private networks (VPNs) - Use of public internet for secure communications
HTTPS for web traffic.
5) Briefly describe the 5 steps for symmetric encryption as it pertains to secure websites.
Briefly describe the 5 steps for symmetric encryption for websites
1. Your computer obtains public key of Web site to which it will connect.
2. Your computer generates a key for symmetric encryption.
3. Your computer encodes key using Web site's public key, then sends encrypted symmetric key to Web site.
4. Web site decodes symmetric key using its private key.
5. Now, your computer and Web site communicate using symmetric encryption.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

The Employee Motivation Audit

Authors: Jane Weightman

1st Edition

0955970709, 978-0955970702

More Books

Students also viewed these Accounting questions

Question

Address an envelope properly.

Answered: 1 week ago

Question

Discuss guidelines for ethical business communication.

Answered: 1 week ago