100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Cryptography and Network Security Principles Key Questions and Correct Answers

Rating
-
Sold
-
Pages
12
Grade
A+
Uploaded on
20-02-2024
Written in
2023/2024

What is TCP/IP? - Transmission Control Protocol/ Internet Protocol Symmetric encryption - Used to conceal the contents of blocks or stream of data of any size, including messages, files, encryption keys, and passwords Cryptographic algorithms can be grouped into what four main areas? - Symmetric encryption Asymmetric encryption Data integrity algorithms Authentication protocols Asymmetric encryption - Used to conceal small blocks of data, such as encryption keys and hash function values, which are used in digital signatures Data integrity algorithms - Used to protect blocks of data from alteration Authentication protocols - Schemes based on the use of cryptographic designed to authenticate the identity of entities The field of Network and Internet Security consists of.. - Measures to deter, prevent, detect, and correct security violations that involve the transmission of information NIST [NIST95] - National Institute of Standards and Technology Computer security - The protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability and confidentiality of information system resources What three objectives are at the heart of computer security? - Confidentiality Integrity Availability Confidentiality has two concepts. What are they? ( in relation to CIA Triad of Confidentiality) - Data confidentiality Privacy Data confidentiality ( in relation to CIA Triad of Confidentiality) - Assures that private or confidential information is not made available or disclosed to unauthorized individuals What are the four data confidentialities in the X.800? - Connection confidentiality Connectionless confidentiality Selective-field confidentiality Traffic-flow confidentiality Privacy ( in relation to CIA Triad of Confidentiality) - Assures that individuals control or influence what related to them may be collected and stored and by whom and to whom information may be disclosed Integrity covers two related concepts. What are they? ( in relation to CIA Triad of Integrity) - Data integrity System integrity Data integrity

Show more Read less
Institution
Cryptography And Network Security
Course
Cryptography and Network Security









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Cryptography and Network Security
Course
Cryptography and Network Security

Document information

Uploaded on
February 20, 2024
Number of pages
12
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
MGRADES Stanford University
View profile
Follow You need to be logged in order to follow users or courses
Sold
1067
Member since
1 year
Number of followers
102
Documents
68976
Last sold
9 hours ago
MGRADES (Stanford Top Brains)

Welcome to MGRADES Exams, practices and Study materials Just think of me as the plug you will refer to your friends Me and my team will always make sure you get the best value from the exams markets. I offer the best study and exam materials for a wide range of courses and units. Make your study sessions more efficient and effective. Dive in and discover all you need to excel in your academic journey!

3.8

168 reviews

5
73
4
30
3
43
2
8
1
14

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions