What does kleopatra allow you to do once it is installed

Assignment Help Computer Network Security
Reference no: EM131143774

Lab- Using Encryption to Enhance Confidentiality and Integrity

Overview

In this lab, you learned how cryptography tools can be used to ensure message and file transfer integrity and how encryption can be used to maximize confidentiality. You used Kleopatra, the certificate management component of GPG4Win, to generate both a public and a private key as both a sender and a receiver. You used the sender's keys to encrypt a file, sent it to the receiver, and decrypted it using the receiver's copy of the keys.

Lab Assessment Questions & Answers

1. If you and another person want to encrypt messages, should you provide that person with your public key, private key, or both?

2. What does Kleopatra allow you to do once it is installed?

3. What key type was used to create the certificate on Kleopatra? What other types of encryption key types are possible?

4. What was the fingerprint generated with your Kleopatra certificate?

5. If someone sends you his public key and you import it into Kleopatra, will he be able to decrypt the encrypted messages you send him?

Reference no: EM131143774

Questions Cloud

Problems facing the bus industry in that country : What policies can secure the best administration of the bus industry and best help disadvantaged users and businesses: What policies can secure best opportunities for profit-making in the bus industry and best help disadvantaged users?
What is the purpose of the business impact analysis : What is the purpose of the business impact analysis (BIA)? What is the difference between a disaster recovery plan (DRP) and a business continuity plan (BCP)?
Discuss the logic for the timing of the ipo : Summarize the different alternatives Quintiles should consider including their advantages and disadvantages. Discuss the logic for the timing of the IPO based on the macroeconomic conditions at the time of this transaction
Identify the accounts that are added to or deducted : Identify the accounts that are added to or deducted from Purchases to determine the cost of goods purchased. For each account, indicate whether it is added or deducted.
What does kleopatra allow you to do once it is installed : What does Kleopatra allow you to do once it is installed? What key type was used to create the certificate on Kleopatra? What other types of encryption key types are possible?
Find the npv using the nominal net benefits and nominal disc : Find the NPV using the nominal net benefits and nominal discount rate. Calculate the net benefits for each of the four years in real terms (in period 0 prices). Calculate the real (i.e. inflation adjusted) discount rate.
Determine pepsicos gross profit rate : Determine PepsiCo's gross profit rate for 2007 and 2006. Indicate whether it increased or decreased from 2006 to 2007.
What is the maximum variable cost of this product : A third option has been proposed by salesman who says the machine is worth the extra cost (a fixed cost of 10,401) when the volume is 25,000 or above. What is the maximum variable cost of this product if the salesman’s claim is true?
Globally pushed the total rewards trend : As we have learned, Total Rewards is a relatively new term.. formerly referred to as simply compensation and benefits! Many factors may have occurred recently that caused companies to implement a Total Rewards Program. Discusss as to what factors nat..

Reviews

Write a Review

Computer Network Security Questions & Answers

  Analysis of the network security

You have just been hired as the security administrator of a major organization that was recently breached by a social engineer. After a thorough analysis of the network security

  Pros and cons to the project using predictive sdlc

Write brief description of the Pros and Cons to approaching the project using the 'Predictive' SDLC, then the Pros and Cons to approaching the project using the 'Adaptive' SDLC.

  What should network engineers expect to happen with security

Why is the current practice of securing the enterprise by hiding it behind hardened firewalls becoming extinct? What should network engineers expect to happen with security in 2 years?

  Explain how outsourcing can be used for risk transference

Describe how outsourcing can be used for risk transference. Name and briefly describe two examples/cases of risk transference in Australia that you believe this type of risk management helps to protect organisations interest. How is an application ..

  How a company-wide policy program could help the situation

Explain why you think the use of these guidelines and procedures is not sufficient and may not solve the problem. Consider how a company-wide policy program could help the situation.

  Describe the security implications of using these technology

Describe the security implications of using these technologies and how risk will be mitigated from a network hardware and software perspective.

  The weakest areas of the cyber security policy

From a FIPS 200 perspective, what are the weakest areas of the cyber security policy associated with the organization you selected? Discuss at least two weak areas and describe why.

  Wat issues need to be considered when planning an

common data formats are critical to being able to exchange data quickly and smoothly. establishing the standards for

  Dissect an email

Dissect an email you have received. First, get the original, ASCII text of the email, including the headers, and the blank line separating the headers and the body of the email.

  How you are going to appropriately secure hospital network

Using everything that we have learned throughout the semester explain me with enough details how you are going to appropriately and effectively secure the hospital network.

  The set of laws rules directives and practices that

1.the set of laws rules directives and practices that regulate how an organization manages protects and distributes

  Write a report on web security services using xml encryption

Write a report on Web security services using XML Encryption and Signatures. The report must have a title, an abstract, an introduction and at least one section that extensively reviews the literature you have read.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd