Public key cryptography and private key cryptography, Computer Networking

Assignment Help:

Question:

a) Differentiate between the following key terms used in any e-banking security system:

(i) Authorisation v/s Authentication.
(ii) Data Integrity v/s Data Confidentiality. 
(iii) Access control v/s Auditing.

b) (i) Differentiate between a technical attack and a non-technical attack giving an example of each to support your answer.

(ii) Outline the difference between public key cryptography and private key cryptography.

c) Differentiate between physiological biometrics and behavioral biometrics. Provide two examples of each biometric measurement above that will be used to identify a person.

d) There are different risks related within an e-banking network and there are different technologies that exist to make sure that the organisation's network boundaries are secure. Name and describe two such technologies.


Related Discussions:- Public key cryptography and private key cryptography

Developing prototypes - digital receipts, Increasingly it is the quality of...

Increasingly it is the quality of the interface of mobile phones that are giving competitors the edge.  Users not only make selections based on cost but also functionality and cert

Data mining, The following DNA sequences are extracted from promoter region...

The following DNA sequences are extracted from promoter region of genes which are co-regulated by the same transcription factor (TF). The nucleotide segments capitalized in the giv

Metrics are used by routing protocols, What metrics are used by routing pro...

What metrics are used by routing protocols to verify the best path?

Quality of service - multiplicative decrease, Q. Quality of Service - multi...

Q. Quality of Service - multiplicative decrease? Quality of Service The collective consequence of service performance which determines the degree of satisfaction of a

What are mac addresses, What are MAC addresses? MAC, or Media Access Co...

What are MAC addresses? MAC, or Media Access Control, uniquely identifies a device on the network. It is also called as physical address or Ethernet address. A MAC address is m

What is multistation access unit, Multistation Access Unit (MAU) C...

Multistation Access Unit (MAU) Combines individual automatic switches May perhaps daisy chain to support more stations

What are the issues are there in network environment, What are the issues t...

What are the issues there in network environment Some of the issues necessary are: Network planning should be carried out covering the following important issues:

Dns cache poisoning, DNS cache poisoning The DNA cache poisoning gener...

DNS cache poisoning The DNA cache poisoning generally refers to the process of maintaining or developing the false information, in the cache of DNS server. This process refers

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd