What does kleopatra allow you to do once it is installed

Assignment Help Computer Network Security
Reference no: EM131143774

Lab- Using Encryption to Enhance Confidentiality and Integrity

Overview

In this lab, you learned how cryptography tools can be used to ensure message and file transfer integrity and how encryption can be used to maximize confidentiality. You used Kleopatra, the certificate management component of GPG4Win, to generate both a public and a private key as both a sender and a receiver. You used the sender's keys to encrypt a file, sent it to the receiver, and decrypted it using the receiver's copy of the keys.

Lab Assessment Questions & Answers

1. If you and another person want to encrypt messages, should you provide that person with your public key, private key, or both?

2. What does Kleopatra allow you to do once it is installed?

3. What key type was used to create the certificate on Kleopatra? What other types of encryption key types are possible?

4. What was the fingerprint generated with your Kleopatra certificate?

5. If someone sends you his public key and you import it into Kleopatra, will he be able to decrypt the encrypted messages you send him?

Reference no: EM131143774

Questions Cloud

Problems facing the bus industry in that country : What policies can secure the best administration of the bus industry and best help disadvantaged users and businesses: What policies can secure best opportunities for profit-making in the bus industry and best help disadvantaged users?
What is the purpose of the business impact analysis : What is the purpose of the business impact analysis (BIA)? What is the difference between a disaster recovery plan (DRP) and a business continuity plan (BCP)?
Discuss the logic for the timing of the ipo : Summarize the different alternatives Quintiles should consider including their advantages and disadvantages. Discuss the logic for the timing of the IPO based on the macroeconomic conditions at the time of this transaction
Identify the accounts that are added to or deducted : Identify the accounts that are added to or deducted from Purchases to determine the cost of goods purchased. For each account, indicate whether it is added or deducted.
What does kleopatra allow you to do once it is installed : What does Kleopatra allow you to do once it is installed? What key type was used to create the certificate on Kleopatra? What other types of encryption key types are possible?
Find the npv using the nominal net benefits and nominal disc : Find the NPV using the nominal net benefits and nominal discount rate. Calculate the net benefits for each of the four years in real terms (in period 0 prices). Calculate the real (i.e. inflation adjusted) discount rate.
Determine pepsicos gross profit rate : Determine PepsiCo's gross profit rate for 2007 and 2006. Indicate whether it increased or decreased from 2006 to 2007.
What is the maximum variable cost of this product : A third option has been proposed by salesman who says the machine is worth the extra cost (a fixed cost of 10,401) when the volume is 25,000 or above. What is the maximum variable cost of this product if the salesman’s claim is true?
Globally pushed the total rewards trend : As we have learned, Total Rewards is a relatively new term.. formerly referred to as simply compensation and benefits! Many factors may have occurred recently that caused companies to implement a Total Rewards Program. Discusss as to what factors nat..

Reviews

Write a Review

Computer Network Security Questions & Answers

  Assignment on 4g wireless networks

The 3rd Generation Partnership Project (3GPP) developed the 3GPP LongTerm Evolution (LTE) standard for wireless communications technology.

  Research on the internet what is health data stewardship

research on the internet what is health data stewardship? why does it matter in the discussion of a national health

  Identify risks inherent in the use of wireless

1. Identify risks inherent in the use of wireless and mobile technologies. 2. Analyze the identified risks and develop factors to mitigate the risks.

  Impair an organizations information security

Compare and contrast a minimum of five potential threats and evaluate how these threats may impair an organization's information security.

  Write about a sophisticated computer or network

The goal of the Final Project is to research and write about a sophisticated computer/network intrusion set/event(s) that have occurred in the recent past, of which I will give you three options. The details on the intrusion set and the attack of ..

  Make an incident-response policy that covers the

gem infosys a small software company has decided to better secure its computer systems after a malware attack shut down

  Have you ever been the victim of a software error

Should the FBI be responsible for the accuracy of information about criminals and crime victims it enters into the National Crime Information Center database?

  Examine the contents of the security and privacy tabs

Using a Microsoft Windows XP, Vista, or 7, open Internet Explorer. Click Internet Options on the Tools menu. Examine the contents of the Security and Privacy tabs. How can these tabs be configured to provide: (a) content filtering and (b) protecti..

  Identifying threats relevant to a particular organization

Explain at least two different risk assessment methodologies - describe the key approaches to identifying threats relevant to a particular organization.

  Write the enterprise technical infrastructure security plan

Write one page with references in APA format.Utilizing your comprehensive security plan outline as a guide (It is the attached document), write the enterprise technical infrastructure security plan for the organization.

  Reference validation mechanism and toe security functions

What are the conceptual differences between a reference validation mechanism, a trusted computing base, and the TOE Security Functions and How will you explain to the management of this company why their software is not a high assurance software.

  Primary steps to database design

We explored the 2-primary steps to database design - conceptual design and physical design. We discussed importance of having representatives from all key stakeholders in conceptual design to ensure accuracy of the design.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd