List and explain key objectives of information security

Assignment Help Computer Network Security
Reference no: EM131174510

Question 1: Information security is used to describe the tasks of protecting information in a digital form.

(1) List and explain three key objectives of information security.

(2) Also list and explain at least two additional protections (concepts)to present a complete view of information security.

Question 2: Integrity protection is used to guard against improper information modification or destruction, including ensuring information non-repudiation and authenticity.

(1) Explain the kinds of technologies (algorithms) that can be used to guarantee data integrity.

(2) Provide two examples of data integrity and

(3) Explain how DLP (Data loss prevention) can be used to prevent data leakage.

Question 3: The earliest and the simplest use of a substitution cipher was by Julius Caesar.

571_Figure.png

Assume that Alice received the following message "skkzskglzkxznkzumgvgxze" from Bob, who used Caesar Cipher to let Alice know "meet me after the toga party".

Please complete the following tasks:

(1) Explain the cryptographic algorithm of Caesar Cipher.

(2) Explain what the plaintext is, what the ciphertext is and what the possible key value is.

(3) Explain an approach that can be used to attack Caesar Cipher. Is it possible to improve the cryptographic algorithm?

Question 4: RSA is an algorithm to encrypt and decrypt messages. RSA stands for Ron Rivest, Adi Shamir and Leonard Adleman, who first publicly described RSA in 1978. A user of RSA creates and then publishes the product of two large prime numbers along with an auxiliary value as their public key. The prime factors must be kept secret. Anyone can use the public key to encrypt a message. However, with currently published methods, if the public key is large enough, only someone with knowledge of the prime factors can feasibly decode the message.

Answer the following questions:

(1) Explain whatcategory of cryptographic algorithms RSA belongs to.

(2) Explain how RSA is used to achieve the cryptography (encryption and decryption) and digital signatures.

(3) Explain the main weakness of digital signatures and how this weakness can be compensated for.

Reference no: EM131174510

Questions Cloud

Opportunities and advancements in technology : Nanotechnology, biometrics, and RFIDs all offer exciting opportunities and advancements in technology. In this assignment, you will investigate each to determine the ways these technologies can help or hinder people. For this assignment, write an ..
Explain various cause of crime using criminal justice theory : Explain the various causes of crime using criminal justice theories, practices. Compare and contrast historical and contemporary police functions, issues.
Does computer system protect patient : Write on the areas of "Does computer system protect patient's privacy medical record?"
Calculate the required pressure in tank a : The total length of DN 50 Schedule 40 steel pipe is 38 m. The elbow is standard. Calculate the required pressure in tank A to cause a flow rate of 43S L/min.
List and explain key objectives of information security : Information security is used to describe the tasks of protecting information in a digital form. List and explain three key objectives of information security. Also list and explain at least two additional protections (concepts)to present a complete v..
Identify a time when you were influenced by media : Identify a time when you were influenced by media bias in relation to a world event, or perhaps an event on a more local level. Explain why you think that the news media is polarized into various positions.
What do you think is meant by the term racial smog : Considering what you learned from the Social Implications of Race video clip-"https://fod.infobase.com/OnDemandEmbed.aspx?token=49734&aid=18596&loid=158992&plt=FOD&w=400&h=340", Chapter 3 in your textbook, and your own experiences, answer the fol..
Describe a story that has recently been sensationalized : Describe a story that has recently been sensationalized, and explain a key component of sensationalism that was part of the way the story was presented.
Assessment at the end of the instructions : Use the assessment at the end of the instructions as a guideline, but again, for where it states "I expect that you will have at least 4 contributions from each author" I find that to be too high a number. 4-8 total would certainly be enough for f..

Reviews

Write a Review

Computer Network Security Questions & Answers

  Chunks of code to give secure-reliable computing environment

How are many chunks of code from many organizations really going to work together to provide a secure and reliable computing environment?

  Describe a meet in the middle attack

1. Answer the following questions brieflya. We discussed the meet-in-the middle attack for 2DES. If we were to use a slightly different version of 2DES where 2 key encryption is done as C = D ( E (P, K1), K2), describe a meet-in-the-middle attack.

  Protecting and securing any kind of network

Protecting and securing any kind of network is our responsibility as a network engineer. No matter what kind of situation we get into weather good or bad we have to stick to our ethics and knowledge to provide the best service and support to our c..

  Characteristics of clausewitzs theory of warfare

Characteristics of Clausewitz's Theory of Warfare and compare and contrast the key characteristics of Clausewitz's theory of warfare.

  Information security program for a midsized organization

The following paper describes the design of an information security program for a midsized organization of roughly 1000 local and remote employees.

  Why change the default administrator login and password

what are some of the important measures you can take to ensure that your home wireless network is safe and secure. Change the default administrator login and password. Use something only you will remember.

  Explain the advantages of ipv6 when compared to ipv4

Explain the advantages of IPv6 when compared to IPv4

  Secure hash function

Secure hash function (one-way hash function) is not only used in message authentication but in digit signatures

  Access control list

DNS Cache Poisoning attack, Turtle Shell Architecture,

  Why one-time password system more secure authentication

Why is one-time password system considered more secure than the basic authentication system? Give at least two reasons.

  Similarities and differences of compliance environments

Analyze the compliance and regulatory issues that face U.S. companies with regard to cybersecurity and information technologies and how to address them within the policy framework.

  What are some windows security infrastructure components

How do you measure security? One of the ways is to calculate risk by the formula: R = T x V x A/C.  What are some Windows security Infrastructure components

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd