Describe briefly the software package called pgp

Assignment Help Management Information Sys
Reference no: EM131411631

1. a. State four reasons why physical security is needed.

b. Discuss briefly the benefits and limitations of asymmetric key encryption.

c. Explain briefly the fivesteps undertaken in risk analysis

2. a. Describe the procedure involved in automatic password cracking algorithm.

b. Define the following terminologies:

(i) Patent

(ii) Trademark

(iii) Copyright

(iv) Trade Secret

(v) Privacy

c. One of the simplest ways to prevent attackers compromising the network is to customize the settings of the network. Customization of the network settings will give the network administrators an efficient means of monitoring network traffic.

They can also put restrictions on the data, and the information exchanged over the network, to prevent exposure of the company's network, thus preventing unknown, and unauthenticated, users from accessing the network. In this regard, describe the following components of network security:

(i) Firewall

(ii) Honeypot

3. a. Biometric measurements or personal attributes are used for authentication. These attributes are unique to the individual seeking to authenticate identification.

(i) List any four types of biometrics that are used for authentication 2 Marks

(ii) Discuss the two types of errors that occur when biometrics are used for authentication.

b. (i) Describe briefly the software package called PGP.

(ii) State three things that PGP is basically used for.

Reference no: EM131411631

Questions Cloud

Can the orange corporation case removed to federal court : Same facts as above. Assume the court finds there is personal jurisdiction. Can the Orange Corporation have the case removed to federal court
What are issues that are involved with idea of moral hazard : What are the issues that are involved with the idea of moral hazard? What are the eight basic facts that support the reason for having financial institutions?
What is the probability of picking a corner point : A plane lattice of points in the shape of a square of size n > 2 has n 2 points. What is the probability of picking a corner point? The probability of picking an inner point?
Prepare a histogram for the data on high temperatures : Prepare a spreadsheet with three columns:  Date, High Temperature, and Low Temperature.  List the past 60 days for which data is available. Prepare a histogram for the data on high temperatures and comment on the shape of the distribution as observ..
Describe briefly the software package called pgp : State four reasons why physical security is needed. Discuss briefly the benefits and limitations of asymmetric key encryption. Explain briefly the fivesteps undertaken in risk analysis.Describe the procedure involved in automatic password cracking al..
Describe the risks and benefits of your two choices : Suppose you need $1 million dollars to start your Dream Business. Research ways to get the money for such a business. Compare two sources of financing you might obtain. Identify the risks and benefits of your two choices.
Npv using a variety of risk adjusted discount rates : Compute the new NPV using a variety of risk adjusted discount rates. Justify your computations in determining how you have adjusted discount rates for risk.
What is the probability that it is a corner item : We have n3 items arranged in the form of a lattice in a cube, and we pick at random an item from an edge (not on the bottom). What is the probability that it is a corner item?
Figure similar to one of figures that illustrates case study : Refer to given Case Study, in which physicians were randomly assigned to take aspirin or a placebo, and heart attack rates were compared. Draw a figure similar to one of Figures that illustrates the steps for Case Study.

Reviews

Write a Review

Management Information Sys Questions & Answers

  What are some tips for developing and using the bis describe

How does the business intelligence system (BIS) at CKE add value to the business? What are some tips for developing and using the BIS described in this case?

  How advances in information technology have changed

Read, Improving the Efficiency, Accuracy, And Cost Effectiveness of Core Business Activities and distinguish how advances in information technology have changed the way businesses are conducted.

  What are the typical financial costs of an erp system

CIS3700 Information Technology for Management Assignment. What are the typical financial costs of an ERP system? Based on the text, what are the activities behind these costs (data conversion, training, etc.)? Why do companies attempt to impleme..

  Advantages for both hardware and software firewalls

Examine two advantages and two disadvantages for both hardware and software firewalls. Explain whether you recommend the hardware or software firewall. Provide the rationale for your response

  End-user development toolsthe pitfalls of the end-user

end-user development toolsthe pitfalls of the end-user development tools can sometimes outweigh its advantages. do you

  Describe enterprise architecture

Using the DMV case study provided, determine how an EA could be used to help the DMV accomplish the objectives stated explicitly and implicitly in the case study

  Pros and three cons of using open source softwarei have a

pros and three cons of using open source softwarei have a study question that i need some help with. can you help?

  Managing files and the world of windows

Use the Internet or Strayer Library to research articles on features about Windows 7 and Windows 10. Next, compare and contrast at least one (1) feature that differs from Windows 7 and Windows 10. Then, select one (1) feature that you believe has ..

  Disruptive technology innovations

Disruptive Technology Innovations - Show example of a company or an industry that is currently failing to adapt to disruptive technology innovations.

  Describe how one would overcome the resistance

Change resistance - Describe how one would overcome the resistance. (Provide specific steps or ideas. Indicate how one would apply this to the hypothetical example above.)

  The company policy is to handle data network storage

an effective information technology manger must be as adept at the application of data storage techniques relative to

  Write a research paper on information preparation

Write a research paper on INFORMATION PREPARATION.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd