8) Which of the tenets of information security is most related to the “need to know” property? C) Confidentiality…
Whitman, M. E., & Mattord, H. (2004). Principles of Information Security. [University of Phoenix Custom Edition e-Text]. , : Course Technology. Retrieved September 15, 2009, from University of Phoenix, CMGT440.…
A secure and efficient protocol is used, ECC elliptic curve cryptography a public key cryptography…
3) Authentication: Verifying the identity of the person or device attempting to access the system.…
4. Which of the following components can be used to measure the confidence in any authentication system?…
3. If you were using corporate e-mail for internal and external communications but did not want to encrypt an e-mail message, what other security countermeasure can you deploy to ensure message integrity?…
The specific purpose of this paper is to describe the authentication process and to describe how this and other information security considerations will affect the design and development process for new information systems.…
Question 4: Data integrity is essential for a company 's operations. Describe various steps companies can use to ensure the integrity of its information.…
Therefore after adding more security to authentication, the effect is witnessed through reduction in the acceptance rate of users while increasing the usability. Consequently, it is very challenging to find the most secure system of authentication that the users can accept. Users are always seeking new features and applications whose interfaces will be easy to use. At the same time, these users express worries that the dangers continues to increase. In addition, the legislations continue to punch companies and manufacturers towards protection of their clients’…
1.2. Explain the legal requirements and agreed ways of working for the security and confidentiality of information.…
Compare the hash values calculated for example.txt that you documented during this lab. Explain in your own words why the hash values will change when the data is modified.…
With the use of computers and networks, there is also a large focus on security. Whenever there is sensitive data being stored and transferred through computer networks, there is the risk of unauthorized individuals gaining access to this information. To lower these chances, we have several different pieces of software and also require multiple passwords that are unique to each authorized individual and a requirement to change the passwords…
Two key components of maintaining confidentiality are the integrity of information and its security. Integrity is achieved by the accuracy and completeness of information using proper processing methods. Security measures are needed to protect information from a wide variety of threats.…
Something you know refers to the use of passwords, passphrases, and codes or PINs. When creating a password, the user must make the decision to create a string of alphanumeric and special characters with differing cases. The longer and more complicated a password the user creates drastically reduces the risk of cracking or brute force attacks. The same password must also be something easily remembered by the user to dissuade it from being written down and stored onsite or left at the workstation. A solution to this is creating a passphrase, a common phrase or date abbreviated and linked together with special characters to create a personal passphrase difficult to crack but easy to remember. An example of this would be a favorite television show with the day and time it airs. A common rule is to create a string at least eight character longs with at least one number and one special character, which this example adheres.…
References: 1. 2. 3. 4. 5. 6. 7. 8. Menezes, A. J. Elliptic curve public key cryptosystems. Kluwer Academic Publishers, 1993. Schneier, B. Applied cryptography. John Wiley & Sons, Inc., 1994. Enge, A. Elliptic curves and their applications to cryptography. Kluwer Academic Publishers, 1999. Menezes, A.., Oorschot, P., and Vanstone, S. Handbook of Applied Cryptography. CRC Press, 1997. Weisstein, E. W. “Number Field Sieve”. Wolfram Research, Inc. Stallings, W. Cryptography and Network Security. Prentice Hall, 2003. Silverman, R. D. “An Analysis of Shamir’s Factoring Device”. RSA Security. May 3, 1999 Shamir, A. “Factoring Large Numbers with the TWINKLE Device”. In proceedings of Cryptographic Hardware and Embedded Systems: First International Workshop, CHES '99. Lecture notes in Computer Science, vol.1717. Springer-Verlag Heidelberg, January 1999: p 2 – 12. Lercier, R. Homepage. Schneier, B. “Elliptic Curve Public Key Cryptography”. Cryptogram ENewsletter. November 15, 1999 “Remarks on the Security of the Elliptic Curve Cryptosystem”. Certicom, whitepaper. September 1997. Blake, I., Seroussi, G., and Smart, N. Elliptic Curves in Cryptography. Cambridge University Press, 1999. Menezes, A., Okamoto, T., and Vanstone, S. “Reducing elliptic curve logarithms to logarithms in a finite field”. Proceedings of the twenty-third annual ACM symposium on Theory of computing. Annual ACM Symposium on Theory of Computing. ACM Press, 1991: p 80 – 89. Satoh, T. and Araki, K. “Fermat quotients and the polynomial time discrete log algorithm for anomalous elliptic curves”. Commentarii Mathematici Universitatis Sancti Pauli 47, 1998: p 81 – 92. Semaev, I. A. “Evaluation of discrete logarithms in a group of p-torsion points of an elliptic curve in characteristic p”. Mathematics of Computation 67, 1998: p 353 – 356. Smart, N. “The discrete logarithm problem on elliptic curves of trace one”. Journal of Cryptography, vol. 12 no. 3. Springer-Verlag New York, October 1999: p 193 – 196. Certicom Press Release. “Certicom Announces Elliptic Curve Cryptosystem…