answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bas_tet [7]
2 years ago
14

Charlie was getting ready to head home when the phone rang- Caller ID showed it was Peter- "Hi, Peter," Charlie said into the re

ceiver- "Want me to start the file cracker on your spreadsheet????" "No, thanks," Peter answered, taking the joke well- "I remembered my passphrase- But I want to get your advice on what we need to do to make the use of encryption more effective and to get it properly licensed for the whole company- I see the value in using it for certain kinds of information, but I'm worried about forgetting a passphrase again, or even worse, that someone else forgets a passphrase or leaves the company- How would we get their files back????" "We need to use a feature called key recovery, which is usually part of PKI software," said Charlie- "Actually, if we invest in PKI software, we could solve that problem as well as several others-" "OK," said Peter- "Can you see me tomorrow at 10 o'clock to talk about this PKI solution and how we can make better use of encryption????"
a- Was Charlie exaggerating when he gave Peter an estimate for the time required to crack the encryption key using a brute force attack?
b- Are there any tools that someone like Peter could use safely, other than a PKI-based system that implements key recovery, to avoid losing his passphrase? Suppose Charlie had installed key logger software on all company computer systems and had made a copy of Peter's encryption key- Suppose that Charlie had this done without policy authority and without anyone's knowledge, including Peter's-
c- Would the use of such a tool be an ethical violation on Charlie's part? Is it illegal? Suppose that Charlie had implemented the key logger with the knowledge and approval of senior company executives, and that every employee had signed a release that acknowledged the company can record all information entered on company systems- Two days after Peter's call, Charlie calls back to give Peter his key: "We got lucky and cracked it early-" Charlie says this to preserve Peter's illusion of privacy-
d- Is such a "little white lie" an ethical action on Charlie's part?
Computers and Technology
1 answer:
Flauer [41]2 years ago
6 0

Answer and Explanation:

I assume Charlie is saying that it will take couple of minutes to crack passphrase using brute force attack. If this is the case then Yes Charlie is exaggerating in this matter. As the time required to break the passphrase depends on the length of the passphrase. More the length, more will be the possibilities or permutations which needed to be tested. So couple of minutes are not enough even if passphrase length is short.

If my assumption is wrong and Charlie is saying that it will take couple of million years to break the passphrase, then also this exaggeration, as, million years is alot of time, and breaking a passphrase of finite length will take alot of time but not in terms of million years.

There are alot of tools available other than PKI based which can be used to crack password. eg. There are some black hat softwares available such as Hiren Boot CD, Windows Password Changer (WPC), etc

You might be interested in
"the ____ criteria filter requires the records displayed to have the specified text string anywhere."
Debora [2.8K]

The contains criteria filter requires the records displayed to have the specified text string anywhere. Thecontains operator is used to perform case-sensitive matching regardless of location in strings.

The begins with criteria filter on the other hand requires the records displayed to start with the specified text string

3 0
2 years ago
The Online Shopping system facilitates the customer to view the products, inquire about the product details, and product availab
jeyben [28]

Answer:

see explaination

Explanation:

We will consider the five Actors in the prearranged Online shopping software system:

Customer:

The scheme allows the customer to do below mention actions:

View goods and inquire about the niceties of products and their ease of use.

To create version to be able to purchase invention from the structure.

Browse crop through search category or shortest search alternative.

Place order for the necessary crop.

Make sum for the order(s) positioned.

Payment System:

Payment system allows client to pay using subsequent two methods:

Credit card.

PayPal.

Seller:

System allow seller to perform underneath actions:

Place the foodstuffs for selling under apposite product category.

Create account to happen to a member.

Administrator:

Following actions are perform by Admin:

Manage the goods posted in the system.

Modify existing manufactured goods categories or add novel categories for foodstuffs.

Site Manager:

System privileges Site director with the following role in the system:

View information on:

Orders Placed by customer

Products added by seller

Accounts created by users

check attachment

3 0
2 years ago
Which is a connectionless protocol in the transport layer? What are the small chunks of data called?
xeze [42]

Answer:

User Datagram Protocol (UDP) , transport-layer segment.

Explanation:

The User Datagram Protocol is popularly known as UDP. It is defined as the communication protocol which is used across the internet for any time sensitive transmission like the DNS lookup or the video playback.

The UDP provides a unreliable and connectionless service to a invoking application.

The transport layers on sending side converts the application $\text{layer }$ messages which it $\text{receives}$ from the $\text{sending application process}$ into a transport layer segment called as the transport layer segments. This is achieved by breaking down the application messages into a smaller chunks and then adding the transport layer header into each chunk so as to create a transport layer segment.

6 0
2 years ago
Read 2 more answers
Seneca has just applied conditional formatting and realizes that she has made a mistake. Which action should she take to fix the
Mama L [17]

Answer:

its b

Explanation:

on edg

3 0
2 years ago
Read 2 more answers
An Internet user has a need to send private data to another user. Which of the following provides the most security when transmi
vazorg [7]

Answer:

C. Sending the data using public-key encryption

Explanation:

Encryption is the only choice that provides security.

4 0
2 years ago
Read 2 more answers
Other questions:
  • True or false? The largest component of a database is a field.
    12·2 answers
  • Jail and prison officials may generally limit inmate rights when the limitations serve
    13·2 answers
  • . When you have multiple graphics positioned on a page, you can _______________ them so that they are a single graphic instead o
    9·1 answer
  • Consider the following code: x = 17 y = 5 print (x % y) What is output?
    10·1 answer
  • Write a static method, getBigWords, that gets a single String parameter and returns an array whose elements are the words in the
    15·1 answer
  • A user calls the help desk and reports that the workstation, when powering up, displays error messages about an invalid system d
    8·1 answer
  • You are on vacation and want to see where all the restaurants and trendy shops are in relation to your hotel. You remember there
    15·1 answer
  • Write the state of the elements of each of the following arrays after each pass of the outermost loop of the selection sort algo
    11·1 answer
  • System design is the determination of the overall system architecture-consisting of a set of physical processing components, ___
    6·2 answers
  • 1. Used ____________ must be hot drained for 12 hours or crushed before disposal.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!