answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dima020 [189]
2 years ago
14

Instructions:

Computers and Technology
1 answer:
Digiron [165]2 years ago
6 0

Answer:

Scenario 1: Advanced Encryption Standard (AES)

It is the best choice for the security of smart phones. AES is symmetric algorithm. It uses keys of 128, 192, and 256 bits and encrypts and decrypts fixed blocks length of 128 bits. It is effective  in encryption of all forms of electronic data. AES encryption is most widely used in smart phones to protect confidential data stored on the device such as bank account information, personal pictures, social security number etc.  It is considered as unbreakable encryption algorithms. For example if smartphone is using AES 256 encryption algorithm to secure its data from attacks, the encrypted data cannot be attacked if the key length is 256-bit as there would be 2256 possible combinations, and a hacker has got to try most of the 2256 possible combinations to guess they key which would take time beyond human lifespan.

Scenario 2:  Digital Signatures  

It is an electronic signature that is used to authenticate the identity of "message sender". It also makes sure that real content of the message has not been changed during transit. Since the company's concern is to protect confidential information from a rival so it the better choice as it assures authentication of message source and data integrity. Digital signatures generate a unique hash of message and use sender's private key to encrypt it. After it the message is signed digitally and sent. Receiver produces his own hash of message. He uses senders's public key to decrypt sender's hash and compares with his own hash. If they match it means the sender is the real one and the message contents are not altered.

Scenario 3: Elliptic curve cryptography (ECC)

It is an asymmetric general-purpose encryption technology. The basic idea behind this method is to generate simple, short, fast and difficult to break encryption keys. This is what the company requires that encryption technology must be general purpose, difficult to break. It uses elliptical curve theory for generating cryptographic keys instead of using large prime numbers. It is efficient to use for smartphones.  ECC does not require much processing power and memory. This results in less overhead faster response time and throughput on Web servers when ECC is being used.

Scenario 4. Secure Sockets Layer (SSL)

It is a standard security technology for setting up an encrypted link between a server and a client (in this case web browsers and web server). SSL is a security protocol that transmits sensitive information securely. As we know data transmitted between browsers and web servers is sent in the form of plain text. If a hacker is able to seize data being transmitted between a browser and a web server, they can misuse that information.  So SSL makes the web servers and web browsers to communicate with each other securely. When transmitting confidential information, a web server and browser set up a secure connection using SSL certificate. The link between web server and browser is encrypted by SSL which makes sure that all data transmitted between them remains private and protected. Due to the sensitive nature of the business SSL is most suitable solution to keep sensitive information sent across internet encrypted making sure that only intended receiver can access it. SSL certificate is used for authentication purpose. For making sure that information is sent to right server, web browsers give indication of secured connection via a lock icon attached or uses https.

Scenario 5: Advanced Encryption Standard (AES)

Confidential Services should choose AES. It is a symmetric encryption algorithm for protecting sensitive data. This means it uses symmetric key encryption in which only one secret key is used to encrypt and decrypt information. This algorithm is also used by U.S. Government agencies to secure sensitive material. Refer to the scenario 1 for more details about AES. It is a fast encryption standard. It is used in both hardware and software. Also it is strong in a sense that it comes up with an option for various key lengths. AES allows  a 128-bit, 192-bit or 256-bit key and are practically unbreakable by brute force based on current computing power

           

 

You might be interested in
Which command suppresses the visibility of a particular Row or column in a worksheet?
leonid [27]

Answer:

Ctrl+Space is the keyboard shortcut to select an entire column.

Explanation:

When you press the Shift+Space shortcut the first time it will select the entire row within the Table.  Press Shift+Space a second time and it will select the entire row in the worksheet.

The same works for columns.  Ctrl+Space will select the column of data in the Table.  Pressing the keyboard shortcut a second time will include the column header of the Table in the selection.  Pressing Ctrl+Space a third time will select the entire column in the worksheet.

You can select multiple rows or columns by holding Shift and pressing the Arrow Keys multiple times.

4 0
2 years ago
6. Write pseudo code that will perform the following. a) Read in 5 separate numbers. b) Calculate the average of the five number
Alex

Answer:

Pseudo CODE

a)

n= Input “Enter 5 integer value”

b)

sum=0.0

For loop with i ranging from 0 - 5

Inside loop sum=n[i]+sum

Outside loop avg= sum/5

Print avg

c)

small=n[0] # assume the first number in the list is smallest

large= n[0] # assume the first number in the list is largest

For loop with i ranging from 0 - 5

Inside loop if n[i]<small #if any another number is smaller than small(variable)

Inside if Then small=n[i]

Inside loop if n[i]>large # if any another number is larger than large(variable)

Inside if then large=n[i]

Print small

Print large

d)

print avg

print small

print large

8 0
2 years ago
Which of the following can be managed using Active Directory Users and Computers snap-in?
Goryan [66]

Answer:

The answer is "Option b".

Explanation:

The active directory can manage the data with active directory customers but a snap-on machine. It is used in scrolling the list, as the earlier replies demonstrate. It will appear on the screen if there is no other startup software installed on a computer.  

This snap-on desktop is only a component, that allows its simultaneous use of different systems or devices on the very same system. It also turns the objects more or less into the pieces of the whole.

7 0
2 years ago
A packet analyzer is a program that can enable a hacker to do all of the following EXCEPT ________. Select one: A. assume your i
bonufazy [111]

Answer:

Option (B) is the correct answer of this question.

Explanation:

Packet analyzer is a software application or set of infrastructure capable of unencrypted and recording communication that travels through a virtual system of a computer system.A packet analyzer used to detect network activity is recognized as a broadband monitoring system.

A packet analyzer is a code application that is used for monitoring, intercepting, and recording http requests with the help of a virtual interface.

Other options are incorrect because they are not related to the given scenario.

8 0
2 years ago
Which of the following is a job that does not lend itself to telecommuting?
jonny [76]

Answer:

a car salesman who demonstrates the features of a new model of car

Explanation:

Telecommuting can be defined as the process or making use of a telephone, email, or the internet to achieve your daily work. An attorney that spends most of her time researching on the computer is making use of an internet to do her work and hence telecommuting is employed. A copywriter for an advertising firm also makes use of email in the process of write copying and hence telecommuting is employed. A telemarketer uses the telephone and a product support who handles queries sent by customers also uses the internet and emails and telephones and hence they all use telecommuting. Demonstrating the feature of a new car does not use require the use of a telephone, email, or the internet.

8 0
1 year ago
Other questions:
  • What is a ribbon in word
    15·2 answers
  • Which item is essential to know before sketching a navigation menu flowchart? template specifics, such as horizontal or vertical
    12·1 answer
  • Write a algorithm to attend birthday party​
    8·2 answers
  • CHALLENGE ACTIVITY 2.9.1: Coordinate geometry. Determine the distance between points (x1, y1) and point (x2, y2), and assign the
    6·1 answer
  • Write an expression that will cause the following code to print "18 or less" if the value of user_age is 18 or less. Write only
    9·2 answers
  • Print "userNum1 is negative." if userNum1 is less than O. End with newline Convert userNum2 to 0 if userNum2 is greater than 8.
    10·1 answer
  • Write the definition of a function printAttitude, which has an int parameter and returns nothing. The function prints a message
    14·1 answer
  • array of String objects, words, has been properly declared and initialized. Each element of words contains a String consisting o
    11·1 answer
  • Given the plaintext {0F0E0D0C0B0A09080706050403020100} and the key {02020202020202020202020202020202}: a. Show the original cont
    11·1 answer
  • What answer best explains why improper netiquette is considered dangerous? Individuals who violate user policies are often charg
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!