SlideShare a Scribd company logo
1 of 2
Download to read offline
This is a three part question. For each part the answer requires identifying an asymmetric
encryption technique, hashing or both. As part of each question you need to discuss the
technique to demonstrate your understanding of how the functionality (confidentiality,
authenticity, integrity) is supported. You need to discuss the details of what the sender and
receiver do and the key usage if applicable.
What technique is used to exchange messages between two parties ensuring confidentiality?
Discuss.
What technique is used to exchange messages between two parties ensuring authenticity?
Discuss
c. What technique is used to exchange messages between two parties ensuring integrity? Discuss.
Solution
a.
Ensuring confidentiality, a very key component of protecting information confidentiality would
be Encryption. Encryption ensures that only the right person who knows the key can read the
information. Encryption is very widespread in today’s world while interacting with one another
through internet. It is the most effective way to achieve the data security. Secure Socket Layer
and Transport Layer Security are the security protocols for communication over internet.
Example: Internet Banking.
Other ways to make sure that the data remains confidential is to implement file permissions and
access control list to restrict access to sensitive information and design of file permissions and
access control lists must be kept as easy as possible for proper maintenance.
c.
Integrity means protecting information so that it cannot be customized by not permitted people.
Information is only as valuable as it is perfect. Similar to the data confidentiality, encryption
plays a prominent role in preserving data integrity. The data shared with another person within a
company or externally to a third party or creating an automatic system report containing sensitive
information, these all data should be encrypted to prevent the data or sensitive information of a
company to be accessed and changed by the third person. The data stored on file shares allow
encryption can prevent the data from being altered by malicious objective or being accessed by
individuals who do not have access.
When accessing data integrity and designing security requirements it is necessary to ensure the
level of encryption is sufficient to protect the integrity of the data, the more sensitive the data the
higher the level of encryption that needs to be enabled.

More Related Content

Similar to This is a three part question. For each part the answer requires ide.pdf

Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Mahmuda Rahman
 
Data security to protect pci data flow ulf mattsson - insecure-mag-40
Data security to protect pci data flow   ulf mattsson - insecure-mag-40Data security to protect pci data flow   ulf mattsson - insecure-mag-40
Data security to protect pci data flow ulf mattsson - insecure-mag-40
Ulf Mattsson
 
1 introit security
1 introit security1 introit security
1 introit security
richarddxd
 
Iaetsd a novel approach to provide the security for distributed adaptive netw...
Iaetsd a novel approach to provide the security for distributed adaptive netw...Iaetsd a novel approach to provide the security for distributed adaptive netw...
Iaetsd a novel approach to provide the security for distributed adaptive netw...
Iaetsd Iaetsd
 
Running Head DATA BREACH .docx
Running Head DATA BREACH                                        .docxRunning Head DATA BREACH                                        .docx
Running Head DATA BREACH .docx
todd271
 
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docxRunning head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
todd271
 
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docxRunning head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
healdkathaleen
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
KnownId
 

Similar to This is a three part question. For each part the answer requires ide.pdf (20)

Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
 
Data security to protect pci data flow ulf mattsson - insecure-mag-40
Data security to protect pci data flow   ulf mattsson - insecure-mag-40Data security to protect pci data flow   ulf mattsson - insecure-mag-40
Data security to protect pci data flow ulf mattsson - insecure-mag-40
 
security IDS
security IDSsecurity IDS
security IDS
 
encryption.pptx
encryption.pptxencryption.pptx
encryption.pptx
 
1 introit security
1 introit security1 introit security
1 introit security
 
Moodle Monkey PPTs
Moodle Monkey PPTsMoodle Monkey PPTs
Moodle Monkey PPTs
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security Architecture
 
Analysis of-security-algorithms-in-cloud-computing [autosaved]
Analysis of-security-algorithms-in-cloud-computing [autosaved]Analysis of-security-algorithms-in-cloud-computing [autosaved]
Analysis of-security-algorithms-in-cloud-computing [autosaved]
 
The CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information SecurityThe CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information Security
 
Survey Paper: Cryptography Is The Science Of Information Security
Survey Paper: Cryptography Is The Science Of Information SecuritySurvey Paper: Cryptography Is The Science Of Information Security
Survey Paper: Cryptography Is The Science Of Information Security
 
Information and network security ins
Information and network security insInformation and network security ins
Information and network security ins
 
Network security unit 1,2,3
Network security unit 1,2,3 Network security unit 1,2,3
Network security unit 1,2,3
 
Target Unncryption Case Study
Target Unncryption Case StudyTarget Unncryption Case Study
Target Unncryption Case Study
 
Iaetsd a novel approach to provide the security for distributed adaptive netw...
Iaetsd a novel approach to provide the security for distributed adaptive netw...Iaetsd a novel approach to provide the security for distributed adaptive netw...
Iaetsd a novel approach to provide the security for distributed adaptive netw...
 
Running Head DATA BREACH .docx
Running Head DATA BREACH                                        .docxRunning Head DATA BREACH                                        .docx
Running Head DATA BREACH .docx
 
A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfA Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdf
 
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docxRunning head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
 
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docxRunning head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
 
Cyber Security Part-I.pptx
Cyber Security Part-I.pptxCyber Security Part-I.pptx
Cyber Security Part-I.pptx
 

More from JUSTSTYLISH3B2MOHALI

In a business projects What material is typically contained in a pro.pdf
In a business projects What material is typically contained in a pro.pdfIn a business projects What material is typically contained in a pro.pdf
In a business projects What material is typically contained in a pro.pdf
JUSTSTYLISH3B2MOHALI
 
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdfI would appreciate help with these 4 questions. Thank You.1) Expla.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
JUSTSTYLISH3B2MOHALI
 
I have a stack in Java populated with integers. Im trying to compa.pdf
I have a stack in Java populated with integers. Im trying to compa.pdfI have a stack in Java populated with integers. Im trying to compa.pdf
I have a stack in Java populated with integers. Im trying to compa.pdf
JUSTSTYLISH3B2MOHALI
 
Explain the data component of social media information systems (SMIS).pdf
Explain the data component of social media information systems (SMIS).pdfExplain the data component of social media information systems (SMIS).pdf
Explain the data component of social media information systems (SMIS).pdf
JUSTSTYLISH3B2MOHALI
 
You are to simulate a dispatcher using a priority queue system in C+.pdf
You are to simulate a dispatcher using a priority queue system in C+.pdfYou are to simulate a dispatcher using a priority queue system in C+.pdf
You are to simulate a dispatcher using a priority queue system in C+.pdf
JUSTSTYLISH3B2MOHALI
 
Write a program that accepts an arithmetic expression of unsigned in.pdf
Write a program that accepts an arithmetic expression of unsigned in.pdfWrite a program that accepts an arithmetic expression of unsigned in.pdf
Write a program that accepts an arithmetic expression of unsigned in.pdf
JUSTSTYLISH3B2MOHALI
 
What is the theory of public debt managementSolution1. Sove.pdf
What is the theory of public debt managementSolution1. Sove.pdfWhat is the theory of public debt managementSolution1. Sove.pdf
What is the theory of public debt managementSolution1. Sove.pdf
JUSTSTYLISH3B2MOHALI
 

More from JUSTSTYLISH3B2MOHALI (20)

In a business projects What material is typically contained in a pro.pdf
In a business projects What material is typically contained in a pro.pdfIn a business projects What material is typically contained in a pro.pdf
In a business projects What material is typically contained in a pro.pdf
 
Implement the following flowchart in java. Start Request integer k f.pdf
Implement the following flowchart in java. Start Request integer k f.pdfImplement the following flowchart in java. Start Request integer k f.pdf
Implement the following flowchart in java. Start Request integer k f.pdf
 
If no chiasma forms between homologous chromosomes, what happens Th.pdf
If no chiasma forms between homologous chromosomes, what happens  Th.pdfIf no chiasma forms between homologous chromosomes, what happens  Th.pdf
If no chiasma forms between homologous chromosomes, what happens Th.pdf
 
If two organims form a symbiotic realtionship where they share t.pdf
If two organims form a symbiotic realtionship where they share t.pdfIf two organims form a symbiotic realtionship where they share t.pdf
If two organims form a symbiotic realtionship where they share t.pdf
 
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdfI would appreciate help with these 4 questions. Thank You.1) Expla.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
 
How do I know when to use the sin^2+cos^2=1 identity....12 angle id.pdf
How do I know when to use the sin^2+cos^2=1 identity....12 angle id.pdfHow do I know when to use the sin^2+cos^2=1 identity....12 angle id.pdf
How do I know when to use the sin^2+cos^2=1 identity....12 angle id.pdf
 
I have a stack in Java populated with integers. Im trying to compa.pdf
I have a stack in Java populated with integers. Im trying to compa.pdfI have a stack in Java populated with integers. Im trying to compa.pdf
I have a stack in Java populated with integers. Im trying to compa.pdf
 
Hint List of commands to read and use use of wild card characters .pdf
Hint List of commands to read and use use of wild card characters .pdfHint List of commands to read and use use of wild card characters .pdf
Hint List of commands to read and use use of wild card characters .pdf
 
Explain in Detail DTE-DCE TransmissionSolutionFirstly the DTE-.pdf
Explain in Detail DTE-DCE TransmissionSolutionFirstly the DTE-.pdfExplain in Detail DTE-DCE TransmissionSolutionFirstly the DTE-.pdf
Explain in Detail DTE-DCE TransmissionSolutionFirstly the DTE-.pdf
 
Explain the data component of social media information systems (SMIS).pdf
Explain the data component of social media information systems (SMIS).pdfExplain the data component of social media information systems (SMIS).pdf
Explain the data component of social media information systems (SMIS).pdf
 
Figure CWhich structure in the cell shown in Figure C above stores.pdf
Figure CWhich structure in the cell shown in Figure C above stores.pdfFigure CWhich structure in the cell shown in Figure C above stores.pdf
Figure CWhich structure in the cell shown in Figure C above stores.pdf
 
Coral reefs. How sensitive to changes in water temperature are coral .pdf
Coral reefs. How sensitive to changes in water temperature are coral .pdfCoral reefs. How sensitive to changes in water temperature are coral .pdf
Coral reefs. How sensitive to changes in water temperature are coral .pdf
 
•0.336 moles of a weak, monoproticacid added to a final volume of 2..pdf
•0.336 moles of a weak, monoproticacid added to a final volume of 2..pdf•0.336 moles of a weak, monoproticacid added to a final volume of 2..pdf
•0.336 moles of a weak, monoproticacid added to a final volume of 2..pdf
 
You are to simulate a dispatcher using a priority queue system in C+.pdf
You are to simulate a dispatcher using a priority queue system in C+.pdfYou are to simulate a dispatcher using a priority queue system in C+.pdf
You are to simulate a dispatcher using a priority queue system in C+.pdf
 
Write a program that accepts an arithmetic expression of unsigned in.pdf
Write a program that accepts an arithmetic expression of unsigned in.pdfWrite a program that accepts an arithmetic expression of unsigned in.pdf
Write a program that accepts an arithmetic expression of unsigned in.pdf
 
Why was the knowledge of macromolecules “structure” very important i.pdf
Why was the knowledge of macromolecules “structure” very important i.pdfWhy was the knowledge of macromolecules “structure” very important i.pdf
Why was the knowledge of macromolecules “structure” very important i.pdf
 
Why did the sovereign debt problem of Greece a country that accounts.pdf
Why did the sovereign debt problem of Greece a country that accounts.pdfWhy did the sovereign debt problem of Greece a country that accounts.pdf
Why did the sovereign debt problem of Greece a country that accounts.pdf
 
Which of the following could be the most likely cause of a superi.pdf
Which of the following could be the most likely cause of a superi.pdfWhich of the following could be the most likely cause of a superi.pdf
Which of the following could be the most likely cause of a superi.pdf
 
What is the theory of public debt managementSolution1. Sove.pdf
What is the theory of public debt managementSolution1. Sove.pdfWhat is the theory of public debt managementSolution1. Sove.pdf
What is the theory of public debt managementSolution1. Sove.pdf
 
Complete a personal SWOT analysis evaluating your understanding and .pdf
Complete a personal SWOT analysis evaluating your understanding and .pdfComplete a personal SWOT analysis evaluating your understanding and .pdf
Complete a personal SWOT analysis evaluating your understanding and .pdf
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Recently uploaded (20)

PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 

This is a three part question. For each part the answer requires ide.pdf

  • 1. This is a three part question. For each part the answer requires identifying an asymmetric encryption technique, hashing or both. As part of each question you need to discuss the technique to demonstrate your understanding of how the functionality (confidentiality, authenticity, integrity) is supported. You need to discuss the details of what the sender and receiver do and the key usage if applicable. What technique is used to exchange messages between two parties ensuring confidentiality? Discuss. What technique is used to exchange messages between two parties ensuring authenticity? Discuss c. What technique is used to exchange messages between two parties ensuring integrity? Discuss. Solution a. Ensuring confidentiality, a very key component of protecting information confidentiality would be Encryption. Encryption ensures that only the right person who knows the key can read the information. Encryption is very widespread in today’s world while interacting with one another through internet. It is the most effective way to achieve the data security. Secure Socket Layer and Transport Layer Security are the security protocols for communication over internet. Example: Internet Banking. Other ways to make sure that the data remains confidential is to implement file permissions and access control list to restrict access to sensitive information and design of file permissions and access control lists must be kept as easy as possible for proper maintenance. c. Integrity means protecting information so that it cannot be customized by not permitted people. Information is only as valuable as it is perfect. Similar to the data confidentiality, encryption plays a prominent role in preserving data integrity. The data shared with another person within a company or externally to a third party or creating an automatic system report containing sensitive information, these all data should be encrypted to prevent the data or sensitive information of a company to be accessed and changed by the third person. The data stored on file shares allow encryption can prevent the data from being altered by malicious objective or being accessed by individuals who do not have access. When accessing data integrity and designing security requirements it is necessary to ensure the
  • 2. level of encryption is sufficient to protect the integrity of the data, the more sensitive the data the higher the level of encryption that needs to be enabled.