Pgp encryption, Computer Network Security

Produce a short report of your experiences in installing and using PGP. The report should be written in the form of a journal that contains at least the following items:

  • A description of your experience in installing PGP on your machine. Include the date of installation, and any difficulties that you encountered.
  • The date on which you submitted your public key to your instructor, noting any difficulties encountered.
  • The date on which your public key, signed by your instructor, appeared on the PGP Key Server in the Conference area.
  • Exchange a PGP encrypted and signed message with your instructor. Document in your report the date(s) of the exchange, along with a brief description of how it went (difficulties experienced, etc.)
  • Exchange the following messages with at least three (3) different students:
    • An unencrypted, PGP signed message
    • A PGP encrypted, but unsigned message
    • A PGP encrypted and signed message

Show in your report the dates of each of these exchanges, along with a description of any difficulties encountered or other observations.

  • Try a PGP experiment of your own invention to test the capabilities of PGP. Write a paragraph or two describing your experiment, and what you learned from it.
  • Conclude with a brief summary of PGP, in particular, its strengths and weaknesses based on your experience with it.
Posted Date: 2/22/2013 8:02:30 AM | Location : United States







Related Discussions:- Pgp encryption, Assignment Help, Ask Question on Pgp encryption, Get Answer, Expert's Help, Pgp encryption Discussions

Write discussion on Pgp encryption
Your posts are moderated
Related Questions
Categories of Controls Controlling risk through mitigation, avoidance or transference is accomplished by implementing controls. There are 4 effective approaches to select the co

QUESTION: (a) Briefly explain the steps involved in Network Simplex Method. (b) What data structures you would expect in the Network Simplex Method. Show the data struct

To master the complexity one must apply the given points. CONCENTRATE IN UNDERSTANDING THE CONCEPTS: Instead of details of wires used to connect computers to a specif

Application-Based IDS Application-based IDS (AppIDS) is an advanced version of HIDS. It examines application for abnormal events. The ability to view encrypted data is the uniqu

POINT-TO-POINT: In Point-to-Point topology there are two kind of topologies. 1) STAR topology 2) TREE topology In star topology each and every computer is connect

(a) Mention the five main security services. (b) What is a passive attack? Give an example of passive attack? (c) What four types of active attacks and mention their respecti

QUESTION There are generally five factors that will influence how you respond to computer security incidents- The effect the incident has on your business Legal issue

ADDRESS RESOLUTION WITH MESSAGE EXCHANGE An alternative to local calculation is a distributed function. A computer that requires to find an address transmits a message across

ADDRESS MASKS To identify receiver, network apply address mask to receiver address and calculate to network address in routing table. It can use Boolean 'and' to calculate the

Question: (a) A Wireless Mesh Network (WMN) is a communications network made up of radio nodes organized in a mesh topology. i. Describe the function of a TAP in WMNs. ii.