Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

11- Name the three goals of information security. (This is not the same as the three properties of a secure system.) 12- What is the

11- Name the three goals of information security. (This is not the same as the three properties of a secure system.)

12- What is the difference between identification and authentication?

13- - What are the three factors that can be used in authentication? (Just name them.)

14- A cryptographic hash algorithm is a one-way function; information processed with such a hash algorithm cannot later be recovered. Name one use for a cryptographic hash and briefly explain how the hash is used in your example. (There are several uses; I only want one of them.)

15- What would be the effect on public key cryptography if mathematicians discover an easy way of finding the prime factors of large numbers? Explain why.

16- In the Unites States, organizations sometimes use Social Security Number or a part of it as an authenticator. Is this a good or bad idea? Explain your answer.

17- Explain in detail why a public key embedded in a digital certificate is much harder to tamper with than the public key alone? (Hint: This question asks about the certificate, not about trusting a certificate authority.)

18- Distinguish between a vulnerability and an exploit.

19- What is the purpose of a key exchange algorithm? With what type of cryptosystem is such an algorithm needed?

20- Briefly describe how the techniques of public key cryptography can be used to implement a digital signature. Be sure you distinguish correctly the use of public and private keys.

21- Explain why using a computationally intensive (i.e. slow) hash algorithm is important when storing password data

22- Distinguish between authentication and authorization.

23- What is the principle of least privilege?

24- What is a default deny policy? (This is also called a closed policy in places in the textbook.)

25- Explain the difference between symmetric key encryption and asymmetric (public) key

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Design Query Formulation And Administration Using Oracle And PostgreSQL

Authors: Michael Mannino

8th Edition

1948426951, 978-1948426954

More Books

Students also viewed these Databases questions