Interaction.5 | First of all, which cryptographic technique can be used to verify the identity of a message's sender? | ☑ Shared Secret Key.
☐ Public-Private Key.
☐ Hashing. | | OK, and how would you use public-private key cryptography to identify the sender of a message? | Two different asymmetrical keys are part of a mathematical equation verifying the senders identity. If the correct result is computed, the receiver knows that the message can only have come from the sender. Both the public and private keys are needed to use the PPK, and that adds to the security of it. Using PPK , you can send messages using any open channel and be confident that the message is intact(message integrity), receiver can only read it (privacy), and sent by you (authentication). | | The board seems to think that requiring usernames and passwords is enough security for our users. Do you agree? | ☑ No; we also need other levels of authentication such as machine authentication in order to provide adequate security.
☐ No; we should require a series of security questions at each login attempt to validate the users.
☐ Yes; as long as the users keep them secure, this is adequate security. | | Is two-factor authentication adequate for a bank? Why or why not? | Well basically, you can identify who is accessing data and using a two-factor authentication strategy, a physical device that contains their credentials and password, like a debit card and PIN number. A debit card is something you have and a pin is something you know. Most banks the require users to authenticate each computer they want to access their accounts through. If an account is locked, the bank require users to call in to reset their pin then the agent requires more proof of identity. | | Which networking device is primarily concerned with getting traffic to its ultimate destination? | ☐ Bastion Hosts
☑ Routers
☐ Bastion hosts and routers both do this. | | And how does security differ between routers and bastion hosts? | Routers forward data throughout a network to their intended destination, doing this with an attempt to not overload any particular device in the network; monitoring traffic and keeping it balanced. An application level gateway firewall is called a bastion host, sitting between the public and private network to defend it by using proxy services containing strict security policies and blocking access services from moving across it. | |
© 2011 Toolwire, Inc. All rights reserved.
You May Also Find These Documents Helpful
-
A message requires (a) the originator 's Plain Language Address as shown in the “From:” line of the message, nd (b) the complete date-time-group.…
- 5067 Words
- 21 Pages
Powerful Essays -
"At the very heart of any understanding of Pompeii and its archaeology must be the demands of the tourist, who as Maiuri explained was the client of archaeology..."…
- 1320 Words
- 6 Pages
Satisfactory Essays -
The authentication process is a necessity for safeguarding systems against various forms of security threats, such as password-cracking tools, brute-force or wordbook attacks, abuse of system access rights, impersonation of attested users, and last but not least reply attacks just to name a few. In addition, it is imperative that authentication policies are interchangeable with the organizations in which information is being exchanged if resources are being shared between alternative organizations.…
- 1478 Words
- 5 Pages
Powerful Essays -
Authentication is the process of ensuring that the individuals trying to access the system are who they claim to be.…
- 4381 Words
- 33 Pages
Satisfactory Essays -
Companies increase security by providing log in and password verification system for each of their employees that need to access their data.…
- 757 Words
- 4 Pages
Good Essays -
v. Users or workforce members must ensure that their user identification is not documented, written, or otherwise exposed in an insecure manner.…
- 1549 Words
- 6 Pages
Powerful Essays -
Without passwords being assigned to data and systems, this simply protection becomes a target for hackers.…
- 313 Words
- 2 Pages
Satisfactory Essays -
There are numerous techniques that the Information Technology industry can use in order to substantiate an entities identity, have the ability to authenticate that entity and provide the appropriate authorization for that entity to have access to a networks resource. There are many diverse techniques that are obtainable to accomplish this task.…
- 630 Words
- 3 Pages
Good Essays -
Is a process of identifying a user and about verifying whether someone is who they claim to be. Typically, authentication is achieved by the user sharing credentials that somehow verify the user's identity. It usually involves a…
- 711 Words
- 3 Pages
Good Essays -
2.2 Password protection could be used to ensure security when storing and/or accessing information. Also ensuring that no-one who is…
- 244 Words
- 1 Page
Satisfactory Essays -
To receive credit for completing the questionnaire, you need to submit your questions and answers to the dropbox. Follow these instructions to do so:…
- 561 Words
- 3 Pages
Satisfactory Essays -
Requiring users to press Ctrl+Alt+Delete to get a logon window is more secure than the welcome screen.…
- 590 Words
- 3 Pages
Satisfactory Essays -
Knowledge of the password is assumed to guarantee that the user is authentic. Each user registers initially (or is registered by someone else), using an assigned or self-declared password. On each subsequent use, the user must know and use the previously declared password. The weakness in this system for transactions that are significant (such as the exchange of money) is that passwords can often be stolen, accidentally revealed, or forgotten.…
- 6445 Words
- 26 Pages
Powerful Essays -
11. Functionalist Perspective – Every structure serves a function that leads to social cohesion and stability.…
- 530 Words
- 3 Pages
Satisfactory Essays -
1. Enforce Password. This makes it so you cannot use the same password more than once or more than 10 times, etc. When you change your password, it cannot be the password you were just using.…
- 350 Words
- 2 Pages
Satisfactory Essays