Unit 8 Assignment
Qsn1.
Answer D-Non-repudiation
Non-repudiation provides assurance that cannot deny sending a message. Non-repudiation is a legal concept typically used in the information security system. It plays a critical role in holding message senders responsible as they cannot dispute a text once sent (Kessler, 2016).
Qsn2.
Answer D-A mathematical formula
This is a mathematical formula used in encrypting data. The algorithm transforms information into meaningless ciphertext during sending, and it uses a key to transform it into the original form (Chapple, Stewart, and Gibson, 2018). This ensures information sent is secured from any form of manipulation. Some of the encryption algorithms are blowfish, RC5 and RC6.
Qsn3.
Answer C-The length of the data being encrypted.
The strength of the algorithm is well defined by its vital size and its effect in resisting cryptanalytic attacks. The length of the data being encrypted does not have any impact on how the encryption works (Kessler, 2016). Therefore it is essential to ensure the key is longer and use larger numbers as a cryptographic key because this will be hard for attacks to crack.
Qsn4.
Answer B- When two different keys encrypt a plaintext message into the same ciphertext
Key clustering occurs when two different keys generate the same plaintext message into the same ciphertext. A good cipher algorithm must be in a position to use different keys on the same plain text and generate different ciphertext regardless of its length (Chapple, Stewart, and Gibson, 2018).
Qsn5.
Answer C-private key
When a message is sent asymmetric encryption public key might be used in encrypting it. Therefore the receiver is required to use the private key in decrypting the text. Private Key is used in encrypting messages used for a particular recipient (Chapple, Stewart, and Gibson, 2018). This ensures that the message is secure from manipulation.
Qsn6.
Answer D-Blowfish
There are two main algorithms for encrypting data and include symmetric and asymmetric. Blowfish was designed to replace DES and is used to split messages into blocks of 64bits and help in encrypting each individually (Chapple, Stewart, and Gibson, 2018). It is the most effective algorithm due to its speed and effectiveness. Therefore many organizations have taken advantage of this algorithm due to its availability in the public domain.
Qsn7.
Answer B C D-Diffie-Hellman, Blowfish and CAST-128
The skipjack uses an 80-bit key typically in encrypting, or it may use 64-bit to decrypt data block. It usually is used in the encrypting algorithm for transmitting information in the United States (Kessler, 2016).
Qsn8.
Answer B-An RSA algorithm is an example of systematic cryptography.
The RSA algorithm relies on asymmetric cryptography and works on two different keys private and public key. RSA algorithm usually is used for a specific purpose, which enables public-key encryption and plays a critical role in protecting sensitive data (Kessler, 2016).
Qsn9.
Answer B-Exploitation of a vulnerability in the information system
It seems there is an increase in the number of attackers trying to gain aces to their systems. Maybe there are loopholes the attackers have identified in the system, thus giving them a chance to gain entry into the system. The detective control would play a critical role in reducing cases of attackers in the system (Chapple, Stewart, and Gibson, 2018).
Qsn10.
Answer A-Impact on the organization
information security should be given top priority as it plays a critical role in protecting organizational data. Information security should be assessed on the impact it will have on an organization (Kessler, 2016). There are various resources, such as time and cost, that play a critical role in subordinating this objective.
Qsn11.
Answer B-negotiate a local version of the organization’s standards
In setting security standards, it is vital to ensure law and regulations are given priority to ensure data is highly protected against any attack that may occur (Kessler, 2016). It is vital to negotiate local versions of standards that the system will adopt.
Qsn12.
Answer C- A tailored methodology based on exposure
Different stage of the information security system requires various strategies to protect it. This must be tailored by each stage (Kessler, 2016).
References
Kessler, G. C. (2016). An Overview of Cryptography (Updated Version, 3 March 2016).
Chapple, M., Stewart, J. M., & Gibson, D. (2018). (ISC) 2 CISSP Certified Information Systems Security Professional Official Study Guide. John Wiley & Sons.