List and explain key objectives of information security

Assignment Help Computer Network Security
Reference no: EM131174510

Question 1: Information security is used to describe the tasks of protecting information in a digital form.

(1) List and explain three key objectives of information security.

(2) Also list and explain at least two additional protections (concepts)to present a complete view of information security.

Question 2: Integrity protection is used to guard against improper information modification or destruction, including ensuring information non-repudiation and authenticity.

(1) Explain the kinds of technologies (algorithms) that can be used to guarantee data integrity.

(2) Provide two examples of data integrity and

(3) Explain how DLP (Data loss prevention) can be used to prevent data leakage.

Question 3: The earliest and the simplest use of a substitution cipher was by Julius Caesar.

571_Figure.png

Assume that Alice received the following message "skkzskglzkxznkzumgvgxze" from Bob, who used Caesar Cipher to let Alice know "meet me after the toga party".

Please complete the following tasks:

(1) Explain the cryptographic algorithm of Caesar Cipher.

(2) Explain what the plaintext is, what the ciphertext is and what the possible key value is.

(3) Explain an approach that can be used to attack Caesar Cipher. Is it possible to improve the cryptographic algorithm?

Question 4: RSA is an algorithm to encrypt and decrypt messages. RSA stands for Ron Rivest, Adi Shamir and Leonard Adleman, who first publicly described RSA in 1978. A user of RSA creates and then publishes the product of two large prime numbers along with an auxiliary value as their public key. The prime factors must be kept secret. Anyone can use the public key to encrypt a message. However, with currently published methods, if the public key is large enough, only someone with knowledge of the prime factors can feasibly decode the message.

Answer the following questions:

(1) Explain whatcategory of cryptographic algorithms RSA belongs to.

(2) Explain how RSA is used to achieve the cryptography (encryption and decryption) and digital signatures.

(3) Explain the main weakness of digital signatures and how this weakness can be compensated for.

Reference no: EM131174510

Questions Cloud

Opportunities and advancements in technology : Nanotechnology, biometrics, and RFIDs all offer exciting opportunities and advancements in technology. In this assignment, you will investigate each to determine the ways these technologies can help or hinder people. For this assignment, write an ..
Explain various cause of crime using criminal justice theory : Explain the various causes of crime using criminal justice theories, practices. Compare and contrast historical and contemporary police functions, issues.
Does computer system protect patient : Write on the areas of "Does computer system protect patient's privacy medical record?"
Calculate the required pressure in tank a : The total length of DN 50 Schedule 40 steel pipe is 38 m. The elbow is standard. Calculate the required pressure in tank A to cause a flow rate of 43S L/min.
List and explain key objectives of information security : Information security is used to describe the tasks of protecting information in a digital form. List and explain three key objectives of information security. Also list and explain at least two additional protections (concepts)to present a complete v..
Identify a time when you were influenced by media : Identify a time when you were influenced by media bias in relation to a world event, or perhaps an event on a more local level. Explain why you think that the news media is polarized into various positions.
What do you think is meant by the term racial smog : Considering what you learned from the Social Implications of Race video clip-"https://fod.infobase.com/OnDemandEmbed.aspx?token=49734&aid=18596&loid=158992&plt=FOD&w=400&h=340", Chapter 3 in your textbook, and your own experiences, answer the fol..
Describe a story that has recently been sensationalized : Describe a story that has recently been sensationalized, and explain a key component of sensationalism that was part of the way the story was presented.
Assessment at the end of the instructions : Use the assessment at the end of the instructions as a guideline, but again, for where it states "I expect that you will have at least 4 contributions from each author" I find that to be too high a number. 4-8 total would certainly be enough for f..

Reviews

Write a Review

Computer Network Security Questions & Answers

  Difficulties in prosecutions of computer-related crimes

What piece of legislation allows computer records documenting criminal activity to be used in court - What is most often overlooked when planning for information security?

  Implementing and managing an information security

Develop a list of at least five (5) best practices for implementing and managing an information security governance program within an organization

  Increment value in one cell in excel

Discuss how to increment value in one cell in Excel if another cell is populated. or example, I have cell A that has values such as 1, 2, 3, 4 etc...

  How should organizations respond to security threats your

how should organizations respond to security threats? your response should be at least 200 words in length. you are

  Various methods of implementing rsa

Technical Guidelines: Study various methods of implementing RSA, a public-key cryptographic algorithm. Write time functions to help you conduct timing measurements for RSA.

  What is the name of the certificate issuing authority

What is the login name and password used for connecting to the ftp server - What files were downloaded? Give their complete download path and their sizes.

  Develop a security awareness training communication plan

Organizational end users are generally in the background when it comes to protecting the IT infrastructure. As the chief security officer (CSO), develop a security awareness training communication plan for these users

  Effective biometric systems

Discuss why are many of the reliable, effective biometric systems perceived as intrusive by users and what are stateful inspection firewalls and how do the tables track the state and context of each exchanged packet?

  Information about the reliable pharmaceutical service

Refer again to the information about the Reliable Pharmaceutical Service (RPS) at the end of Chapter 1, "The World of the Information Systems Analyst."

  What are public private partnerships

Research the concepts and structures for public-private partnerships as a means of furthering public policy goals - What are Public Private Partnerships

  Describe key issues challenges risks from this case study

Describe the key issues/challenges/risks from this case study. Based on the information provided in the case study, describe and document the recommended security strategy to mitigate the issues/challenges identified

  Explain the importance of communication protocols

Explain the importance of communication protocols. Identify the protocols in your design and provide rationale for your decision. Define the overall network architecture. Explain the usefulness of a traffic analysis.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd