Question
11- Name the three goals of information security. (This is not the same as the three properties of a secure system.) 12- What is the
11- Name the three goals of information security. (This is not the same as the three properties of a secure system.)
12- What is the difference between identification and authentication?
13- - What are the three factors that can be used in authentication? (Just name them.)
14- A cryptographic hash algorithm is a one-way function; information processed with such a hash algorithm cannot later be recovered. Name one use for a cryptographic hash and briefly explain how the hash is used in your example. (There are several uses; I only want one of them.)
15- What would be the effect on public key cryptography if mathematicians discover an easy way of finding the prime factors of large numbers? Explain why.
16- In the Unites States, organizations sometimes use Social Security Number or a part of it as an authenticator. Is this a good or bad idea? Explain your answer.
17- Explain in detail why a public key embedded in a digital certificate is much harder to tamper with than the public key alone? (Hint: This question asks about the certificate, not about trusting a certificate authority.)
18- Distinguish between a vulnerability and an exploit.
19- What is the purpose of a key exchange algorithm? With what type of cryptosystem is such an algorithm needed?
20- Briefly describe how the techniques of public key cryptography can be used to implement a digital signature. Be sure you distinguish correctly the use of public and private keys.
21- Explain why using a computationally intensive (i.e. slow) hash algorithm is important when storing password data
22- Distinguish between authentication and authorization.
23- What is the principle of least privilege?
24- What is a default deny policy? (This is also called a closed policy in places in the textbook.)
25- Explain the difference between symmetric key encryption and asymmetric (public) key
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started