Preview

Cledoux Lab 2 2 Answers 102614

Satisfactory Essays
Open Document
Open Document
171 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cledoux Lab 2 2 Answers 102614
LAB #2 – ASSESSMENT WORKSHEET
Implement Hashing and Encryption for Secure
Communications

N442/CIS4456 Section 01 Hacker Techniques, Tools, and Applications
Chris Ledoux
Russ Dulaney
10/12/14

1. The reason why the change occurred because I have altered the Example.txt file, causing it's hash string to change. It is useful to a security analyst because he or she will know if the data has been either altered or tampered with, and also they change to keep authentication and integrity.
2. Both the original and modified hash string values are in hexadecimal form. The reason why the hash values will change when the data is modified is to show that the data has been modified.
3. They could use digital signatures in the email that you are sending out
4. They also could use digital signature plus they could use cryptography along with it
5. MD5sum is a one-way has function that has a 128 bit has for the input. SHA1sum processes up to 512 and adds padding. Sha1sum is better because padding is added to ensure the right numbers.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    The primary goal of this lab is to learn the names of many blood vessels. You will use the models provided as well as pictures in your lab book.…

    • 365 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 3 Quiz

    • 501 Words
    • 3 Pages

    to set parameters for the Last Two Digit test and for creating suspicious output databases.…

    • 501 Words
    • 3 Pages
    Good Essays
  • Good Essays

    We can see that this checksum is as same as the one of the original file. That means the file has not been altered after encryption and decryption.…

    • 987 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    3. If you were using corporate e-mail for internal and external communications but did not want to encrypt an e-mail message, what other security countermeasure can you deploy to ensure message integrity? Digital Signature…

    • 559 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab6 7 8 9

    • 425 Words
    • 2 Pages

    2. Because if something were to happen to the computer the backups wouldn’t be gone with the computer.…

    • 425 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 6 Assignment 1

    • 228 Words
    • 1 Page

    1. How much data has been modified between the last back and the time of failure?…

    • 228 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    13.) What do you use to specify what bits are being used to lock a number into place?…

    • 641 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Lab Question Answers 02

    • 415 Words
    • 1 Page

    They find many clues that the body wasn’t actually that of Cora and also signs that Crippen may not have committed the crime.…

    • 415 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Lab question 3

    • 278 Words
    • 1 Page

    6. What evidence exists to cast suspicion on John Knoll? What evidence exists to suggest that he wasn't involved?…

    • 278 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 7 Answers

    • 1433 Words
    • 6 Pages

    Digital Signature – a hash of a document that is encrypted using the document creator’s private key.…

    • 1433 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    final answers 1304 1

    • 5146 Words
    • 36 Pages

    The Health Belief Model acknowledges that people often are ambivalent toward behaviors change and presents behavior change as a process, rather than a one-step solution.…

    • 5146 Words
    • 36 Pages
    Satisfactory Essays
  • Satisfactory Essays

    lab 2

    • 398 Words
    • 2 Pages

    3. If you were using corporate e-mail for internal and external communications but did not want to encrypt an e-mail message, what other security countermeasure can you deploy to ensure message integrity?…

    • 398 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    lab 1 assignment

    • 395 Words
    • 2 Pages

    Dissolved oxygen is oxygen that is trapped in a fluid, such as water. Since virtually every living organism requires oxygen to survive, it is a necessary component of water systems such as streams, lakes and rivers in order to support aquatic life. The dissolved oxygen is measure in units of ppm—or parts per million. Examine the data in Table 2 showing the amount of dissolved oxygen present and the number of fish observed in the body of water the sample was taken from; finally, answer the questions below.…

    • 395 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Sci101-1302b-02

    • 1172 Words
    • 5 Pages

    Evolution is and ongoing process of change and diversification which every scientist to this day accept as a historical fact. However, evolution is a very controversial subject worldwide. There are many studies, theories, and opinions regarding how we became to be, including every living creature and human being, the universe and everything else that comes along with it, and especially how our planet Earth transformed into what it is today. Phyletic gradualism and punctuated equilibrium are two very controversial and debatable theories/concepts that have brought up lots of questions, opinions, and answers. Gradualism and punctuated equilibrium are two different concepts that seem to intertwine along each other’s path. In this IP 2 I will explain both theories.…

    • 1172 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    element. It increases accuracy by eliminating the rekeying of data. The quality of data is enhanced by…

    • 5051 Words
    • 21 Pages
    Powerful Essays

Related Topics