1)
a) method of concealing data including messages, files, keys and passwords is known as symmetric encryption
b) method to protect blocks of data from being altered is known as data protection
c) three parts of CIA triad - Confidentiality, Integrity, availability
d)
Accountability | Availability |
specifically applying the traceability of actions to the system entity | It maintains the hardware by providing the function of repair whenever it it necessaryand also maintains the operating systems functioning. |
e) itu-t recommended security architecture for OSI called X800
2.
Active Attack | Passive attack |
Detection is tends to be easiier | Detection is tends to be difficult |
It harms the system | It does not harms the system |
The main aim of an attacker is to alter the information or original message | The main aim of an attacker is to retrive the provided information |
Attacks cannot be prevented easily | Attacks can be prevented |
Types:
|
Types:
|
Ex: Making an attempt to entry into other account. | Ex: Eves dropping |
3) Categories of Active attack
HOMEWORK 1: CS 386 (Cryptography) Due Date: January 25, 2018 1. Write short answers for each...
Chapter 06 Applied Cryptography 1. How is integrity provided? A. Using two-way hash functions and digital signatures B. Using one-way hash functions and digital signatures C. By applying a digital certificate D. By using asymmetric encryption 2. Which term refers to the matching of a user to an account through previously shared credentials? A. Nonrepudiation B. Digital signing C. Authentication D. Obfuscation 3. Which term refers to an arranged group of algorithms? A. Crypto modules B. Cryptographic service providers (CSPs)...
A new version of the operating system is being planned for installation into your department’s production environment. What sort of testing would you recommend is done before your department goes live with the new version? Identify each type of testing and describe what is tested. Explain the rationale for performing each type of testing. [ your answer goes here ] Would the amount of testing and types of testing to be done be different if you were installing a security...
10. Write a one-page summary of the attached paper? INTRODUCTION Many problems can develop in activated sludge operation that adversely affect effluent quality with origins in the engineering, hydraulic and microbiological components of the process. The real "heart" of the activated sludge system is the development and maintenance of a mixed microbial culture (activated sludge) that treats wastewater and which can be managed. One definition of a wastewater treatment plant operator is a "bug farmer", one who controls the aeration...