Question
4.1 What are your choices if you are hit by ransomware? Which would you recommend? 4-2. a) What form of authentication would you recommend for
4.1 What are your choices if you are hit by ransomware? Which would you recommend? 4-2. a) What form of authentication would you recommend for relatively unimportant resources? Justify your answer. b) What form of authentication would you recommend for your most sensitive resources? 4-3. What is the promise of newer authentication systems? 4-4. Is the supplicant the true party or an impostor? 4-5. In digital certificate authentication, the supplicant could impersonate the true party by doing the calculation with the true partys private key. What prevents impostors from doing this? 4-6. What are the implications for digital certificate authentication if the true partys private key is stolen? 4-7. a) If someone in your firm gives you his or her password and you log into that persons account, is this hacking? Justify your answer in terms of the definition of hacking. b) If you think someone in your office is sending slanderous e-mail about you, is it hacking if you break into that persons e-mail account to see if this is true? Justify using the definition. c) If you log into a server at your bank to test their security, is this hacking? Justify using the definition.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started