Reference no: EM131174510
Question 1: Information security is used to describe the tasks of protecting information in a digital form.
(1) List and explain three key objectives of information security.
(2) Also list and explain at least two additional protections (concepts)to present a complete view of information security.
Question 2: Integrity protection is used to guard against improper information modification or destruction, including ensuring information non-repudiation and authenticity.
(1) Explain the kinds of technologies (algorithms) that can be used to guarantee data integrity.
(2) Provide two examples of data integrity and
(3) Explain how DLP (Data loss prevention) can be used to prevent data leakage.
Question 3: The earliest and the simplest use of a substitution cipher was by Julius Caesar.

Assume that Alice received the following message "skkzskglzkxznkzumgvgxze" from Bob, who used Caesar Cipher to let Alice know "meet me after the toga party".
Please complete the following tasks:
(1) Explain the cryptographic algorithm of Caesar Cipher.
(2) Explain what the plaintext is, what the ciphertext is and what the possible key value is.
(3) Explain an approach that can be used to attack Caesar Cipher. Is it possible to improve the cryptographic algorithm?
Question 4: RSA is an algorithm to encrypt and decrypt messages. RSA stands for Ron Rivest, Adi Shamir and Leonard Adleman, who first publicly described RSA in 1978. A user of RSA creates and then publishes the product of two large prime numbers along with an auxiliary value as their public key. The prime factors must be kept secret. Anyone can use the public key to encrypt a message. However, with currently published methods, if the public key is large enough, only someone with knowledge of the prime factors can feasibly decode the message.
Answer the following questions:
(1) Explain whatcategory of cryptographic algorithms RSA belongs to.
(2) Explain how RSA is used to achieve the cryptography (encryption and decryption) and digital signatures.
(3) Explain the main weakness of digital signatures and how this weakness can be compensated for.
Opportunities and advancements in technology
: Nanotechnology, biometrics, and RFIDs all offer exciting opportunities and advancements in technology. In this assignment, you will investigate each to determine the ways these technologies can help or hinder people. For this assignment, write an ..
|
Explain various cause of crime using criminal justice theory
: Explain the various causes of crime using criminal justice theories, practices. Compare and contrast historical and contemporary police functions, issues.
|
Does computer system protect patient
: Write on the areas of "Does computer system protect patient's privacy medical record?"
|
Calculate the required pressure in tank a
: The total length of DN 50 Schedule 40 steel pipe is 38 m. The elbow is standard. Calculate the required pressure in tank A to cause a flow rate of 43S L/min.
|
List and explain key objectives of information security
: Information security is used to describe the tasks of protecting information in a digital form. List and explain three key objectives of information security. Also list and explain at least two additional protections (concepts)to present a complete v..
|
Identify a time when you were influenced by media
: Identify a time when you were influenced by media bias in relation to a world event, or perhaps an event on a more local level. Explain why you think that the news media is polarized into various positions.
|
What do you think is meant by the term racial smog
: Considering what you learned from the Social Implications of Race video clip-"https://fod.infobase.com/OnDemandEmbed.aspx?token=49734&aid=18596&loid=158992&plt=FOD&w=400&h=340", Chapter 3 in your textbook, and your own experiences, answer the fol..
|
Describe a story that has recently been sensationalized
: Describe a story that has recently been sensationalized, and explain a key component of sensationalism that was part of the way the story was presented.
|
Assessment at the end of the instructions
: Use the assessment at the end of the instructions as a guideline, but again, for where it states "I expect that you will have at least 4 contributions from each author" I find that to be too high a number. 4-8 total would certainly be enough for f..
|