SlideShare a Scribd company logo
1 of 2
Download to read offline
a)In the words of Snowden "properly Imlemented strong crypto systems are one of the few
things that you can rely on." By strong crypto he meant Public Key Cryptography(one key is
public and other key is private) like RSA. The 2nd part is implementation which again comes on
human being.Also public key system require that users authenticate each public key before they
use them.Users must keep their local system physically secure and protect the private
key.Finally, it is as good as pass phrase chosen by the user. If somehow Keys are disclosed the
data is no more safe.
b)Identification occurs when you type your username into a login screen because you have
claimed to be that person, while authentication occurs after you have typed in a password and hit
the 'login' button, at which time the validity you claim to the username is determined. Many
studies have shown that users tend to choose short and guessable passwords, this makes them
vulnerable to attacks. Other ways of stealing the password is using keylogger software where
keystrokes are recorded, users can be fooled by phishing mails, users fail to change password
from time to time even when instructed to, users choose same password for multiple systems.
c)There can be many cases where access control can be compromised- Not locking down
workstations or laptops, not keeping extra security measures on portable devices in case of theft
or you lose them, logging on remote system through open/unencrypted wireless network etc
It is very difficult to remember so many passwords and check all security measures all the time
for human beings. There are people out there who has laid all traps and waiting to steal
information and data. Humans will always be the weakest link in any security system as we are
not designed to act like machine.
Solution
a)In the words of Snowden "properly Imlemented strong crypto systems are one of the few
things that you can rely on." By strong crypto he meant Public Key Cryptography(one key is
public and other key is private) like RSA. The 2nd part is implementation which again comes on
human being.Also public key system require that users authenticate each public key before they
use them.Users must keep their local system physically secure and protect the private
key.Finally, it is as good as pass phrase chosen by the user. If somehow Keys are disclosed the
data is no more safe.
b)Identification occurs when you type your username into a login screen because you have
claimed to be that person, while authentication occurs after you have typed in a password and hit
the 'login' button, at which time the validity you claim to the username is determined. Many
studies have shown that users tend to choose short and guessable passwords, this makes them
vulnerable to attacks. Other ways of stealing the password is using keylogger software where
keystrokes are recorded, users can be fooled by phishing mails, users fail to change password
from time to time even when instructed to, users choose same password for multiple systems.
c)There can be many cases where access control can be compromised- Not locking down
workstations or laptops, not keeping extra security measures on portable devices in case of theft
or you lose them, logging on remote system through open/unencrypted wireless network etc
It is very difficult to remember so many passwords and check all security measures all the time
for human beings. There are people out there who has laid all traps and waiting to steal
information and data. Humans will always be the weakest link in any security system as we are
not designed to act like machine.

More Related Content

Similar to a)In the words of Snowden properly Imlemented strong crypto system.pdf

Authentication and session v4
Authentication and session v4Authentication and session v4
Authentication and session v4skimil
 
Multi Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignMulti Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignRajat Jain
 
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_faHai Nguyen
 
More Issues on Digital Identity (24Feb2023)
More Issues on Digital Identity (24Feb2023)More Issues on Digital Identity (24Feb2023)
More Issues on Digital Identity (24Feb2023)Hitoshi Kokumai
 
A novel multifactor authentication system ensuring usability and security
A novel multifactor authentication system ensuring usability and securityA novel multifactor authentication system ensuring usability and security
A novel multifactor authentication system ensuring usability and securityijsptm
 
M-Pass: Web Authentication Protocol
M-Pass: Web Authentication ProtocolM-Pass: Web Authentication Protocol
M-Pass: Web Authentication ProtocolIJERD Editor
 
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORDAN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORDIJNSA Journal
 
TM112 Meeting10-Dangerous Data.pptx
TM112 Meeting10-Dangerous Data.pptxTM112 Meeting10-Dangerous Data.pptx
TM112 Meeting10-Dangerous Data.pptxMohammedYusuf609377
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptxKnownId
 
Op Sy 03 Ch 61a
Op Sy 03 Ch 61aOp Sy 03 Ch 61a
Op Sy 03 Ch 61a Google
 
VTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notesVTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notesJayanth Dwijesh H P
 
CIA = Confidentiality of information, Integrity of information, Avai.pdf
CIA = Confidentiality of information, Integrity of information, Avai.pdfCIA = Confidentiality of information, Integrity of information, Avai.pdf
CIA = Confidentiality of information, Integrity of information, Avai.pdfannaielectronicsvill
 
Mobile authentication
Mobile authenticationMobile authentication
Mobile authenticationHai Nguyen
 
How to 2FA-enable Open Source Applications
How to 2FA-enable Open Source ApplicationsHow to 2FA-enable Open Source Applications
How to 2FA-enable Open Source ApplicationsAll Things Open
 

Similar to a)In the words of Snowden properly Imlemented strong crypto system.pdf (20)

Authentication and session v4
Authentication and session v4Authentication and session v4
Authentication and session v4
 
Multi Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignMulti Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect Design
 
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_fa
 
More Issues on Digital Identity (24Feb2023)
More Issues on Digital Identity (24Feb2023)More Issues on Digital Identity (24Feb2023)
More Issues on Digital Identity (24Feb2023)
 
A novel multifactor authentication system ensuring usability and security
A novel multifactor authentication system ensuring usability and securityA novel multifactor authentication system ensuring usability and security
A novel multifactor authentication system ensuring usability and security
 
Computer security
Computer securityComputer security
Computer security
 
M-Pass: Web Authentication Protocol
M-Pass: Web Authentication ProtocolM-Pass: Web Authentication Protocol
M-Pass: Web Authentication Protocol
 
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORDAN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
 
TM112 Meeting10-Dangerous Data.pptx
TM112 Meeting10-Dangerous Data.pptxTM112 Meeting10-Dangerous Data.pptx
TM112 Meeting10-Dangerous Data.pptx
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
J0704055058
J0704055058J0704055058
J0704055058
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
 
Encryption by fastech
Encryption by fastechEncryption by fastech
Encryption by fastech
 
Op Sy 03 Ch 61a
Op Sy 03 Ch 61aOp Sy 03 Ch 61a
Op Sy 03 Ch 61a
 
C02
C02C02
C02
 
VTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notesVTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notes
 
CIA = Confidentiality of information, Integrity of information, Avai.pdf
CIA = Confidentiality of information, Integrity of information, Avai.pdfCIA = Confidentiality of information, Integrity of information, Avai.pdf
CIA = Confidentiality of information, Integrity of information, Avai.pdf
 
Mobile authentication
Mobile authenticationMobile authentication
Mobile authentication
 
How to 2FA-enable Open Source Applications
How to 2FA-enable Open Source ApplicationsHow to 2FA-enable Open Source Applications
How to 2FA-enable Open Source Applications
 
s117
s117s117
s117
 

More from aoneonlinestore1

1. VacuolesThe vacuole is an organelle in plant cells which stores.pdf
1. VacuolesThe vacuole is an organelle in plant cells which stores.pdf1. VacuolesThe vacuole is an organelle in plant cells which stores.pdf
1. VacuolesThe vacuole is an organelle in plant cells which stores.pdfaoneonlinestore1
 
1. B) - Two independent properties serve to specify the state.2. B.pdf
1. B) - Two independent properties serve to specify the state.2. B.pdf1. B) - Two independent properties serve to specify the state.2. B.pdf
1. B) - Two independent properties serve to specify the state.2. B.pdfaoneonlinestore1
 
(NH4)2SO4 is a soluble salt and is fully ionized in solution(NH4).pdf
(NH4)2SO4 is a soluble salt and is fully ionized in solution(NH4).pdf(NH4)2SO4 is a soluble salt and is fully ionized in solution(NH4).pdf
(NH4)2SO4 is a soluble salt and is fully ionized in solution(NH4).pdfaoneonlinestore1
 
I have inserted spaces. Consider f(x) belonging to f(X) thi.pdf
 I have inserted spaces. Consider f(x) belonging to f(X) thi.pdf I have inserted spaces. Consider f(x) belonging to f(X) thi.pdf
I have inserted spaces. Consider f(x) belonging to f(X) thi.pdfaoneonlinestore1
 
C program that prompts user to enter two floating point t.pdf
  C program that prompts user to enter two floating point t.pdf  C program that prompts user to enter two floating point t.pdf
C program that prompts user to enter two floating point t.pdfaoneonlinestore1
 
The carbonyl functional group in glucose is an al.pdf
                     The carbonyl functional group in glucose is an al.pdf                     The carbonyl functional group in glucose is an al.pdf
The carbonyl functional group in glucose is an al.pdfaoneonlinestore1
 
Well to find the pH at the equivalance point. Acc.pdf
                     Well to find the pH at the equivalance point. Acc.pdf                     Well to find the pH at the equivalance point. Acc.pdf
Well to find the pH at the equivalance point. Acc.pdfaoneonlinestore1
 
The weakest base in the reaction is A the enolat.pdf
                     The weakest base in the reaction is A the enolat.pdf                     The weakest base in the reaction is A the enolat.pdf
The weakest base in the reaction is A the enolat.pdfaoneonlinestore1
 
so take an aliquot of the upper layer and add a f.pdf
                     so take an aliquot of the upper layer and add a f.pdf                     so take an aliquot of the upper layer and add a f.pdf
so take an aliquot of the upper layer and add a f.pdfaoneonlinestore1
 
moles of NH4Cl formed = 20.050 = 0.1 moles so we.pdf
                     moles of NH4Cl formed = 20.050 = 0.1 moles so we.pdf                     moles of NH4Cl formed = 20.050 = 0.1 moles so we.pdf
moles of NH4Cl formed = 20.050 = 0.1 moles so we.pdfaoneonlinestore1
 
Latency is a measure of time delay experienced in.pdf
                     Latency is a measure of time delay experienced in.pdf                     Latency is a measure of time delay experienced in.pdf
Latency is a measure of time delay experienced in.pdfaoneonlinestore1
 
Entropy is the measure of disorder. Therefore, th.pdf
                     Entropy is the measure of disorder. Therefore, th.pdf                     Entropy is the measure of disorder. Therefore, th.pdf
Entropy is the measure of disorder. Therefore, th.pdfaoneonlinestore1
 
dydx = 1x dy = dxx y = ln x + c .pdf
                     dydx = 1x dy = dxx y = ln x + c               .pdf                     dydx = 1x dy = dxx y = ln x + c               .pdf
dydx = 1x dy = dxx y = ln x + c .pdfaoneonlinestore1
 
Ø Napoleonic era brought some relief to the faltering ottoman empire.pdf
Ø Napoleonic era brought some relief to the faltering ottoman empire.pdfØ Napoleonic era brought some relief to the faltering ottoman empire.pdf
Ø Napoleonic era brought some relief to the faltering ottoman empire.pdfaoneonlinestore1
 
YES=Cathode rays have mass. .yes=Matter contains positive and nega.pdf
YES=Cathode rays have mass. .yes=Matter contains positive and nega.pdfYES=Cathode rays have mass. .yes=Matter contains positive and nega.pdf
YES=Cathode rays have mass. .yes=Matter contains positive and nega.pdfaoneonlinestore1
 
TWEEN ENGINE1.Tween engine is universal.2.Reusability of tween .pdf
TWEEN ENGINE1.Tween engine is universal.2.Reusability of tween .pdfTWEEN ENGINE1.Tween engine is universal.2.Reusability of tween .pdf
TWEEN ENGINE1.Tween engine is universal.2.Reusability of tween .pdfaoneonlinestore1
 
To identify the identity of Variable Interest Entity , first of all .pdf
To identify the identity of Variable Interest Entity , first of all .pdfTo identify the identity of Variable Interest Entity , first of all .pdf
To identify the identity of Variable Interest Entity , first of all .pdfaoneonlinestore1
 
technology is the application of scientific knowledge. technology is.pdf
technology is the application of scientific knowledge. technology is.pdftechnology is the application of scientific knowledge. technology is.pdf
technology is the application of scientific knowledge. technology is.pdfaoneonlinestore1
 
b)The cations on the left side act as oxidants. C.pdf
                     b)The cations on the left side act as oxidants. C.pdf                     b)The cations on the left side act as oxidants. C.pdf
b)The cations on the left side act as oxidants. C.pdfaoneonlinestore1
 

More from aoneonlinestore1 (20)

1. VacuolesThe vacuole is an organelle in plant cells which stores.pdf
1. VacuolesThe vacuole is an organelle in plant cells which stores.pdf1. VacuolesThe vacuole is an organelle in plant cells which stores.pdf
1. VacuolesThe vacuole is an organelle in plant cells which stores.pdf
 
1. B) - Two independent properties serve to specify the state.2. B.pdf
1. B) - Two independent properties serve to specify the state.2. B.pdf1. B) - Two independent properties serve to specify the state.2. B.pdf
1. B) - Two independent properties serve to specify the state.2. B.pdf
 
(NH4)2SO4 is a soluble salt and is fully ionized in solution(NH4).pdf
(NH4)2SO4 is a soluble salt and is fully ionized in solution(NH4).pdf(NH4)2SO4 is a soluble salt and is fully ionized in solution(NH4).pdf
(NH4)2SO4 is a soluble salt and is fully ionized in solution(NH4).pdf
 
I have inserted spaces. Consider f(x) belonging to f(X) thi.pdf
 I have inserted spaces. Consider f(x) belonging to f(X) thi.pdf I have inserted spaces. Consider f(x) belonging to f(X) thi.pdf
I have inserted spaces. Consider f(x) belonging to f(X) thi.pdf
 
C program that prompts user to enter two floating point t.pdf
  C program that prompts user to enter two floating point t.pdf  C program that prompts user to enter two floating point t.pdf
C program that prompts user to enter two floating point t.pdf
 
The carbonyl functional group in glucose is an al.pdf
                     The carbonyl functional group in glucose is an al.pdf                     The carbonyl functional group in glucose is an al.pdf
The carbonyl functional group in glucose is an al.pdf
 
Well to find the pH at the equivalance point. Acc.pdf
                     Well to find the pH at the equivalance point. Acc.pdf                     Well to find the pH at the equivalance point. Acc.pdf
Well to find the pH at the equivalance point. Acc.pdf
 
The weakest base in the reaction is A the enolat.pdf
                     The weakest base in the reaction is A the enolat.pdf                     The weakest base in the reaction is A the enolat.pdf
The weakest base in the reaction is A the enolat.pdf
 
so take an aliquot of the upper layer and add a f.pdf
                     so take an aliquot of the upper layer and add a f.pdf                     so take an aliquot of the upper layer and add a f.pdf
so take an aliquot of the upper layer and add a f.pdf
 
moles of NH4Cl formed = 20.050 = 0.1 moles so we.pdf
                     moles of NH4Cl formed = 20.050 = 0.1 moles so we.pdf                     moles of NH4Cl formed = 20.050 = 0.1 moles so we.pdf
moles of NH4Cl formed = 20.050 = 0.1 moles so we.pdf
 
Latency is a measure of time delay experienced in.pdf
                     Latency is a measure of time delay experienced in.pdf                     Latency is a measure of time delay experienced in.pdf
Latency is a measure of time delay experienced in.pdf
 
Entropy is the measure of disorder. Therefore, th.pdf
                     Entropy is the measure of disorder. Therefore, th.pdf                     Entropy is the measure of disorder. Therefore, th.pdf
Entropy is the measure of disorder. Therefore, th.pdf
 
dydx = 1x dy = dxx y = ln x + c .pdf
                     dydx = 1x dy = dxx y = ln x + c               .pdf                     dydx = 1x dy = dxx y = ln x + c               .pdf
dydx = 1x dy = dxx y = ln x + c .pdf
 
Ø Napoleonic era brought some relief to the faltering ottoman empire.pdf
Ø Napoleonic era brought some relief to the faltering ottoman empire.pdfØ Napoleonic era brought some relief to the faltering ottoman empire.pdf
Ø Napoleonic era brought some relief to the faltering ottoman empire.pdf
 
YES=Cathode rays have mass. .yes=Matter contains positive and nega.pdf
YES=Cathode rays have mass. .yes=Matter contains positive and nega.pdfYES=Cathode rays have mass. .yes=Matter contains positive and nega.pdf
YES=Cathode rays have mass. .yes=Matter contains positive and nega.pdf
 
TWEEN ENGINE1.Tween engine is universal.2.Reusability of tween .pdf
TWEEN ENGINE1.Tween engine is universal.2.Reusability of tween .pdfTWEEN ENGINE1.Tween engine is universal.2.Reusability of tween .pdf
TWEEN ENGINE1.Tween engine is universal.2.Reusability of tween .pdf
 
upSolutionup.pdf
upSolutionup.pdfupSolutionup.pdf
upSolutionup.pdf
 
To identify the identity of Variable Interest Entity , first of all .pdf
To identify the identity of Variable Interest Entity , first of all .pdfTo identify the identity of Variable Interest Entity , first of all .pdf
To identify the identity of Variable Interest Entity , first of all .pdf
 
technology is the application of scientific knowledge. technology is.pdf
technology is the application of scientific knowledge. technology is.pdftechnology is the application of scientific knowledge. technology is.pdf
technology is the application of scientific knowledge. technology is.pdf
 
b)The cations on the left side act as oxidants. C.pdf
                     b)The cations on the left side act as oxidants. C.pdf                     b)The cations on the left side act as oxidants. C.pdf
b)The cations on the left side act as oxidants. C.pdf
 

Recently uploaded

Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 

Recently uploaded (20)

Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 

a)In the words of Snowden properly Imlemented strong crypto system.pdf

  • 1. a)In the words of Snowden "properly Imlemented strong crypto systems are one of the few things that you can rely on." By strong crypto he meant Public Key Cryptography(one key is public and other key is private) like RSA. The 2nd part is implementation which again comes on human being.Also public key system require that users authenticate each public key before they use them.Users must keep their local system physically secure and protect the private key.Finally, it is as good as pass phrase chosen by the user. If somehow Keys are disclosed the data is no more safe. b)Identification occurs when you type your username into a login screen because you have claimed to be that person, while authentication occurs after you have typed in a password and hit the 'login' button, at which time the validity you claim to the username is determined. Many studies have shown that users tend to choose short and guessable passwords, this makes them vulnerable to attacks. Other ways of stealing the password is using keylogger software where keystrokes are recorded, users can be fooled by phishing mails, users fail to change password from time to time even when instructed to, users choose same password for multiple systems. c)There can be many cases where access control can be compromised- Not locking down workstations or laptops, not keeping extra security measures on portable devices in case of theft or you lose them, logging on remote system through open/unencrypted wireless network etc It is very difficult to remember so many passwords and check all security measures all the time for human beings. There are people out there who has laid all traps and waiting to steal information and data. Humans will always be the weakest link in any security system as we are not designed to act like machine. Solution a)In the words of Snowden "properly Imlemented strong crypto systems are one of the few things that you can rely on." By strong crypto he meant Public Key Cryptography(one key is public and other key is private) like RSA. The 2nd part is implementation which again comes on human being.Also public key system require that users authenticate each public key before they use them.Users must keep their local system physically secure and protect the private key.Finally, it is as good as pass phrase chosen by the user. If somehow Keys are disclosed the data is no more safe. b)Identification occurs when you type your username into a login screen because you have claimed to be that person, while authentication occurs after you have typed in a password and hit the 'login' button, at which time the validity you claim to the username is determined. Many studies have shown that users tend to choose short and guessable passwords, this makes them
  • 2. vulnerable to attacks. Other ways of stealing the password is using keylogger software where keystrokes are recorded, users can be fooled by phishing mails, users fail to change password from time to time even when instructed to, users choose same password for multiple systems. c)There can be many cases where access control can be compromised- Not locking down workstations or laptops, not keeping extra security measures on portable devices in case of theft or you lose them, logging on remote system through open/unencrypted wireless network etc It is very difficult to remember so many passwords and check all security measures all the time for human beings. There are people out there who has laid all traps and waiting to steal information and data. Humans will always be the weakest link in any security system as we are not designed to act like machine.