Preview

It Info 1

Satisfactory Essays
Open Document
Open Document
420 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
It Info 1
Title Week 7: Access Control and Authentication Assessment Test

Interaction.5
First of all, which cryptographic technique can be used to verify the identity of a message's sender?
☐ Shared Secret Key.
☑ Public-Private Key.
☐ Hashing.

First of all, which cryptographic technique can be used to verify the identity of a message's sender?
☑ Shared Secret Key.
☐ Public-Private Key.
☐ Hashing.

OK, and how would you use public-private key cryptography to identify the sender of a message?
There are two different asymmetrical keys that are used to identify the sender. The way this works is that is it part of a mathematical equation and if it is correct the receiver will know what the message came from the sender. So when using PPK you can send a message will be send and only the receiver can read it.

The board seems to think that requiring usernames and passwords is enough security for our users. Do you agree?
☑ No; we also need other levels of authentication such as machine authentication in order to provide adequate security.
☐ No; we should require a series of security questions at each login attempt to validate the users.
☐ Yes; as long as the users keep them secure, this is adequate security.

Is two-factor authentication adequate for a bank? Why or why not?
It makes sure that no can steal some information and get to your account. They would need to get that physical piece, a card or id to prove they are the correct person. If your pin or password was stolen, you can be sure that your money is safe since they need that physical object. I feel that is adequate and is a great idea. That is one reason it is good to put see id on your credit cards as well so they need a two-factor authentication.

Which networking device is primarily concerned with getting traffic to its ultimate destination?
☐ Bastion Hosts
☑ Routers
☐ Bastion hosts and routers both do this.

And how does security differ between routers and bastion hosts?
A

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Chapter 20 lab

    • 284 Words
    • 2 Pages

    6. Describe the software and protocols used when Max sends an email to Sam on a remote Linux system.…

    • 284 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    If we watch these specific areas closer and implement some user policies, I’m certain that we can normalize as well as reduce security threats to our network and in turn, will make our company a more productive and profitable…

    • 285 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    CIS502FINAL EXAMS

    • 1966 Words
    • 20 Pages

    Two parties that have never communicated before wish to send messages using asymmetric key cryptography. How should the parties begin?…

    • 1966 Words
    • 20 Pages
    Powerful Essays
  • Good Essays

    4) What actions must you take before and after the message is delivered to ensure that it was received as intended?…

    • 595 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    07: Password and Ref

    • 4381 Words
    • 33 Pages

    Authentication is the process of ensuring that the individuals trying to access the system are who they claim to be.…

    • 4381 Words
    • 33 Pages
    Satisfactory Essays
  • Satisfactory Essays

    4. They also could use digital signature plus they could use cryptography along with it…

    • 171 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Capstone Review

    • 2842 Words
    • 11 Pages

    2. Use the OSI model to explain how an email message from you gets read by the…

    • 2842 Words
    • 11 Pages
    Good Essays
  • Good Essays

    Unit 4 P6

    • 757 Words
    • 4 Pages

    Companies increase security by providing log in and password verification system for each of their employees that need to access their data.…

    • 757 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    This paper will discuss and analyze the requirements for search and arrest warrants based with regard to probable cause. I will post a recent news regarding probable cause and will discuss exceptions to warrant requirements.…

    • 389 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NVQ Unit 4222 201

    • 1043 Words
    • 5 Pages

    Communication is a 2 -way process.It is not simply about sending a message ,but also knowing about if the receiver has understood and processed the message properly.…

    • 1043 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Leadership Management

    • 582 Words
    • 3 Pages

    The two key stages in the communication process are the sender who sends the message and the recipient who receives the message. Eg: when I send message to my friend I become the sender and when she receives the message she becomes the receiver.…

    • 582 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    3. The third step is the when the receiver has to interpret/decode the sender 's message.…

    • 1467 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Acct 504 Quiz 4

    • 1811 Words
    • 8 Pages

    | The response to a sender's message that allows both the sender and receiver to know that a message was received correctly is: Answer…

    • 1811 Words
    • 8 Pages
    Good Essays
  • Good Essays

    The Rsa Algorithm

    • 5348 Words
    • 22 Pages

    In 1978, Ron Rivest, Adi Shamir, and Leonard Adleman introduced a cryptographic algorithm, which was essentially to replace the less secure National Bureau of Standards (NBS) algorithm. Most importantly, RSA implements a public-key cryptosystem, as well as digital signatures. RSA is motivated by the published works of Diffie and Hellman from several years before, who described the idea of such an algorithm, but never truly developed it. Introduced at the time when the era of electronic email was expected to soon arise, RSA implemented two important ideas: 1. Public-key encryption. This idea omits the need for a “courier” to deliver keys to recipients over another secure channel before transmitting the originally-intended message. In RSA, encryption keys are public, while the decryption keys are not, so only the person with the correct decryption key can decipher an encrypted message. Everyone has their own encryption and decryption keys. The keys must be made in such a way that the decryption key may not be easily deduced from the public encryption key. 2. Digital signatures. The receiver may need to verify that a transmitted message actually originated from the sender (signature), and didn’t just come from there (authentication). This is done using the sender’s decryption key, and the signature can later be verified by anyone, using the corresponding public encryption key. Signatures therefore cannot be forged. Also, no signer can later deny having signed the message. This is not only useful for electronic mail, but for other electronic transactions and transmissions, such as fund transfers. The security of the RSA algorithm has so far been validated, since no known attempts to break it have yet been successful, mostly due to the difficulty of factoring large numbers n = pq, where p and q are large prime numbers.…

    • 5348 Words
    • 22 Pages
    Good Essays
  • Good Essays

    National Identity Cards

    • 571 Words
    • 3 Pages

    In the present time of security issues and threats from terrorists, the idea of a national identity card has risen. Larry Elison, the CEO of Oracle Corp., who sells software for managing large database, offered to give his company’s services for the government’s use without a fee. Although national identity are a quick fix, Americans lose more of their privacy and freedom. We do not need another card that will cause another payout for taxpayers, invades our privacy, and not solve any serious problems.…

    • 571 Words
    • 3 Pages
    Good Essays