Preview

Chapter 9 ISS

Good Essays
Open Document
Open Document
620 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Chapter 9 ISS
Chapter 9

1 Identify a security objective that adds value to a business.
Confidentiality
Privacy
Integrity
Acess Control
Authorization
2 True or False: AES is an asymmetric encryption algorithm.
False
3 True or False: 3DES is an asymmetric encryption algorithm.
False
4 True or False: RSA is an asymmetric encryption algorithm.
True
5 True or False: RC4 is an asymmetric encryption algorithm.
False
6 Identify a security principle that can be satisfied with an asymmetric digital signature and not by a symmetric signature. nonrepudiation 7 True or False: Cipher text is a mechanism for accomplishing confidentiality, integrity, authentication, and nonrepudiation.
False
8 True or False: Cryptography is a mechanism for accomplishing confidentiality, integrity, authentication, and nonrepudiation.
True
9 True or False: Access control is a mechanism for accomplishing confidentiality, integrity, authentication, and nonrepudiation.
False
10 True or False: Hashing is a mechanism for accomplishing confidentiality, integrity, authentication, and nonrepudiation.
False
11 What is the a cipher that shifts each letter in the English alphabet a fixed number of positions, with Z wrapping back to A?
Caesar Cipher
12 Identify a security objective that stops authorization for access to data.
Revocation
13 True or False: Revocation is a security objective that binds a message or data to a specific entity and adds value to relationships between businesses.
False
14 True or False: Authorization is a security objective that binds a message or data to a specific entity and adds value to relationships between businesses.
False
15 True or False: Timestamping is a security objective that binds a message or data to a specific entity and adds value to relationships between businesses.
False
16 True or False: Message authentication is a security objective that binds a message or data to a specific entity and adds value to relationships between businesses.
False
17 In which type of cipher attack

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Jennifer works in the Sales Department by day and part-time as the evening accounts payable clerk with credit memo privileges to correct customer orders. Jennifer is a valuable asset for the organization. Since she joined the accounts payable department, the late payment rate has dropped by 20 percent while the warehouse-shipping rate increased by 10 percent, and the overall profit has increased by a modest amount of 0.005 percent for the first reporting period.…

    • 1078 Words
    • 7 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 8 Lab 1

    • 421 Words
    • 2 Pages

    12. Relate back to the C-I-A tenets of information systems security. Hashing provides file versioning while encryption provides file…

    • 421 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    It255 Final Study Guide

    • 843 Words
    • 4 Pages

    3. An AUP is part of a layered approach to security, and it supports confidentiality. What else supports confidentiality?…

    • 843 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    3. If you were using corporate e-mail for internal and external communications but did not want to encrypt an e-mail message, what other security countermeasure can you deploy to ensure message integrity? Digital Signature…

    • 559 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    1.3 - Explain the purpose of legal and organizational requirements for the security and confidentiality of information…

    • 1681 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    NT 2580 Project Part 2

    • 2096 Words
    • 9 Pages

    Issue two. Based on the premise that most of the managers have BlackBerry devices for instant communications and all employees are provided cell phones, you must research and detail the cryptography methods to protect organizational information using techniques that ensure its integrity, confidentiality, authenticity, and non-repudiation, and the recovery of encrypted information in its original form.…

    • 2096 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Fcs 006

    • 856 Words
    • 4 Pages

    2. ____ occurs whenever an individual gains access to a computer, network, file, or other resource without permission. a. Spoofing c. Phishing b. Unauthorized access d. Vandalizing 3. ____ refers to the act of breaking into a computer or network. a. Spamming c. Hacking b. Phishing d. Spoofing 4. Advocates of ____ state that, unless individuals or businesses protect their access points, they are welcoming others to use them. a. spoofing c. spamming b. phishing d. war driving 5. ____ access systems use physical objects for identification purposes and they are frequently used to control access to facilities and computer systems. a. Touch object c. Two-factor b. Possessed object d. Biometric 6. A ____ is a security system that essentially creates a wall between a computer or network and the Internet in order to protect against unauthorized access. a. Trojan horse c. hub b. firewall d. bridge 7. ____ uses a single secret key to both encrypt and decrypt the file or message. a. Private key encryption c. Public key encryption b. Asymmetric key encryption d. Synchronous key encryption 8. Some Web-based encrypted e-mail system, such as the popular free ____ service梤 equire both the sender and recipient to have accounts through that system. a. CryptMail c. HushMail b. QuietMail d. PrivateMail…

    • 856 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    2. What is an Access Control List (ACL) and how is it useful in a layered security strategy?…

    • 928 Words
    • 3 Pages
    Good Essays
  • Good Essays

    lab 5

    • 718 Words
    • 3 Pages

    What is Authorization and how is this concept aligned with Identification and Authentication? Authorization is a set of rights defined for a subject and an object; this concept is aligned with Identification and Authentication because these are the 3 steps to the access control process…

    • 718 Words
    • 3 Pages
    Good Essays
  • Good Essays

    | Keep information secure and manage personal access to information sources securelyProtect systems and data: Access controls: Physical controls: log-in details should be treated as credit card information and not to be left lying anywhere with an easy access, locks, passwords, access levels.…

    • 793 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Assignment 209 NVQ 2

    • 272 Words
    • 2 Pages

    Aii. Explain why it is important to have secure systems for recording and storing information in a…

    • 272 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    True False

    • 378 Words
    • 2 Pages

    1. A requirement is something a database needs to do in order to fulfill its purpose.…

    • 378 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Cryptography

    • 385 Words
    • 2 Pages

    Answer the following questions by filling in the blank using the proper technology or cryptography terms you have learned in class:…

    • 385 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Cmgt400 Week 3

    • 1752 Words
    • 8 Pages

    With the advances in technology, authentication has become part of our everyday lives, whether scanning your badge at work, signing for a credit card purchase, or logging into your Facebook/Twitter accounts. Authentication is the act of validating your identity while requesting access to software, purchases, or entry to a secured facility. There are four types of authentication; something you know, something you have, something you are, and something you can produce. When a service requests two or more types of authentication, it is called strong authentication, such as inserting an identification card and providing a password to access a computer workstation.…

    • 1752 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Health and Social Care

    • 260 Words
    • 2 Pages

    | |1.2 Explain why it is important to have secure systems for recording and storing |…

    • 260 Words
    • 2 Pages
    Satisfactory Essays

Related Topics