Preview

lab 2

Satisfactory Essays
Open Document
Open Document
398 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
lab 2
1. Compare the hash values calculated for example.txt that you documented during this lab. Explain in your own words why the hash values will change when the data is modified.

They change to keep authentication and integrity.

2. Why are the MD5sum and SHA1sum hash values the same every time you calculate for the “example.txt” sample fi le? What if they were different when you re-calculated the hash value at the other end?

These are the same to verify authentication and integrity. If they don’t match the data has been compromised.

3. If you were using corporate e-mail for internal and external communications but did not want to encrypt an e-mail message, what other security countermeasure can you deploy to ensure message integrity?

They could use digital signatures in the email.

4. If you are using corporate e-mail for external communications that contain confidential information, what other security countermeasure can you deploy to maximize confidentiality of e-mail transmissions through the Internet?

They can use digital signatures along with cryptography.

5. What is the difference between MD5sum and SHA1sum hashing calculations? Which is better and why?

MD5sum is a one-way has function that has a 128 bit has for the input. SHA1sum processes up to 512 and adds padding. Sha1sum is better because padding is added to ensure the right numbers.

6. Where can you store your public keys or public certificate fi les in the public domain? Is this the same thing as a public key infrastructure (PKI) server?

It is stored on the domain.

7. What do you need if you want to decrypt encrypted messages and fi les from a trusted sender?

You would need the public key to decrypt the message.

8. What encryption mechanisms are built into Microsoft® Windows XP Professional?

EFS is what is built into Microsoft Windows XP.

9. Which Windows encryption mechanism provides full disk encryption and

You May Also Find These Documents Helpful

  • Satisfactory Essays

    4. They also could use digital signature plus they could use cryptography along with it…

    • 171 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    NT260 unit 1 assignment 1

    • 624 Words
    • 3 Pages

    2. List three suggestions to harden SMTP server security. Backup your Exchange server periodically, Audit your Exchange server, and Digitally sign and Encrypt your Email.…

    • 624 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Classify at least two (2) security assurances that could be achieved by the CIO developing a formal security awareness, training, and educational program.…

    • 514 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Final Exam

    • 3599 Words
    • 15 Pages

    d. data masking (Correct. Masking replaces actual values with fake ones, but the result is still the same type of data, which can then be used to test program logic.)…

    • 3599 Words
    • 15 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 3 Essay

    • 764 Words
    • 4 Pages

    8. Identify the five components of an information system. Which are most directly impacted by the study of computer security? Which are most commonly associated with its…

    • 764 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Lab 1

    • 414 Words
    • 2 Pages

    4. Why would you use a tool like DevManView while performing a computer forensic investigation?…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    CSEC 630 Final Exam

    • 1055 Words
    • 4 Pages

    Includes how you implement information security solutions, such as secure e-mail and secure Web communications.…

    • 1055 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Discussion 1

    • 396 Words
    • 2 Pages

    From a management perspective, analyze the overall industry requirements and major organizational challenges of forming a sound information security program, and ascertain the fundamental manner in which regulations and compliancy may factor into the challenges in question.…

    • 396 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Richman Investments holds requirements for the usage of the company network including filtering policies for network traffic…

    • 332 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Lab 1

    • 753 Words
    • 3 Pages

    4- Do compliance laws, such as HIPAA or GLBA, play a role in AUP definition?…

    • 753 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    BTC200 HW2

    • 422 Words
    • 2 Pages

    2) What are the two primary lines of security defense and how can organizational employees use the information taught by the Intense School when drafting an information security plan?…

    • 422 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Risk Management

    • 426 Words
    • 2 Pages

    Provide and explain an example of an information technology security threat. Analyze how administrative, detective, preventative, and corrective could be used to mitigate the threat.…

    • 426 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Employer should be interested in ensuring that the e-mail system is not being used in ways that offend others, to harm morale, or for disruptive purposes (Barrett & Anderson, 2007).…

    • 671 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Pretty Good Privacy

    • 647 Words
    • 3 Pages

    Pretty Good Privacy (PGP) is system which is widely used in the email environment and digital signature. This system employs few encryptions to ensure the information security and integrity during network transmission. In this project, we are going to analyze many aspects of PGP, such as standards, protocols and implementations. Also, we will use SVO logic to proof the authentication of PGP.…

    • 647 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    lemme

    • 3472 Words
    • 14 Pages

    Electronic mail (e-mail) is one of the most popular network services nowadays. Most e-mail systems that send mail over the Internet use simple mail transfer protocol (SMTP) to send messages from one server to another. The messages can then be retrieved with an e-mail client using either post office protocol (POP) or Internet message access protocol (IMAP). SMTP is also generally used to send messages from a mail client to a mail server in “hostbased” (or Unix-based) mail systems, where a simple mbox utility might be on the same system [or via Network File System (NFS) provided by Novell] for access without POP or IMAP. This chapter describes the fundamentals of SMTP, elements of its client–server architecture (user agent, mail transfer agent, ports), request–response mechanism, commands,mail transfer phases, SMTP messages, multipurpose internet mail extensions (MIME) for non-ASCII (American Standard Code for Information Interchange) data, e-mail delivery cases, mail access protocols (POP3 and IMAP4), SMTP software, vulnerability and security issues, standards, associations, and organizations.…

    • 3472 Words
    • 14 Pages
    Powerful Essays