Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Need a response PLEASE!!!! In response to your peers, select one of the situations described by a peer and think about a way that you

Need a response PLEASE!!!!

In response to your peers, select one of the situations described by a peer and think about a way that you could increase the overall security measures of the situation. Use a systems thinking approach, and think outside of the box!

Robert Hubbert

Symmetric encryption is a speedy tool that is beneficial for short term communication (or data sessions that are short). It provides confidentiality to data in transit like authentication or financial transactions. Because symmetric encryption is faster than asymmetric, it can be used for storage media to offer some protection with a focus on speed. An example would be using symmetric encryption to authenticate to a local router or near by wireless device. The authentication action needs to be confidential but smaller/simpler devices don't have many resources. Using symmetric encryption reduces the resource requirement and improves speed while maintaining confidentiality.

Asymmetric encryption is a more secure option with other abilities like providing digital signatures and compatibility with public key infrastructures. This type of encryption would be used in a windows active directory domain service (ADDS) for authenticating. Security is a priority for an ADDS environment and we'd want to prevent outsiders from breaking the encryption or becoming a man in the middle.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Data Infrastructure For Medical Research In Databases

Authors: Thomas Heinis ,Anastasia Ailamaki

1st Edition

1680833480, 978-1680833485

More Books

Students also viewed these Databases questions

Question

Describe the sources of long term financing.

Answered: 1 week ago