This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

D-Non-repudiation

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

Unit 8 Assignment

Qsn1.

Answer D-Non-repudiation

Non-repudiation provides assurance that cannot deny sending a message. Non-repudiation is a legal concept typically used in the information security system. It plays a critical role in holding message senders responsible as they cannot dispute a text once sent (Kessler, 2016).

Qsn2.

Answer D-A mathematical formula

This is a mathematical formula used in encrypting data. The algorithm transforms information into meaningless ciphertext during sending, and it uses a key to transform it into the original form (Chapple, Stewart, and Gibson, 2018). This ensures information sent is secured from any form of manipulation. Some of the encryption algorithms are blowfish, RC5 and RC6.

Qsn3.

Answer C-The length of the data being encrypted.

The strength of the algorithm is well defined by its vital size and its effect in resisting cryptanalytic attacks. The length of the data being encrypted does not have any impact on how the encryption works (Kessler, 2016). Therefore it is essential to ensure the key is longer and use larger numbers as a cryptographic key because this will be hard for attacks to crack.

Qsn4.

Answer B- When two different keys encrypt a plaintext message into the same ciphertext

Key clustering occurs when two different keys generate the same plaintext message into the same ciphertext. A good cipher algorithm must be in a position to use different keys on the same plain text and generate different ciphertext regardless of its length (Chapple, Stewart, and Gibson, 2018).

Qsn5.

Answer C-private key

When a message is sent asymmetric encryption public key might be used in encrypting it. Therefore the receiver is required to use the private key in decrypting the text. Private Key is used in encrypting messages used for a particular recipient (Chapple, Stewart, and Gibson, 2018). This ensures that the message is secure from manipulation.

Qsn6.

Answer D-Blowfish

There are two main algorithms for encrypting data and include symmetric and asymmetric. Blowfish was designed to replace DES and is used to split messages into blocks of 64bits and help in encrypting each individually (Chapple, Stewart, and Gibson, 2018). It is the most effective algorithm due to its speed and effectiveness. Therefore many organizations have taken advantage of this algorithm due to its availability in the public domain.

Qsn7.

Answer B C D-Diffie-Hellman, Blowfish and CAST-128

The skipjack uses an 80-bit key typically in encrypting, or it may use 64-bit to decrypt data block. It usually is used in the encrypting algorithm for transmitting information in the United States (Kessler, 2016).

Qsn8.

Answer B-An RSA algorithm is an example of systematic cryptography.

The RSA algorithm relies on asymmetric cryptography and works on two different keys private and public key. RSA algorithm usually is used for a specific purpose, which enables public-key encryption and plays a critical role in protecting sensitive data (Kessler, 2016).

Qsn9.

Answer B-Exploitation of a vulnerability in the information system

It seems there is an increase in the number of attackers trying to gain aces to their systems. Maybe there are loopholes the attackers have identified in the system, thus giving them a chance to gain entry into the system. The detective control would play a critical role in reducing cases of attackers in the system (Chapple, Stewart, and Gibson, 2018).

Qsn10.

Answer A-Impact on the organization
information security should be given top priority as it plays a critical role in protecting organizational data. Information security should be assessed on the impact it will have on an organization (Kessler, 2016). There are various resources, such as time and cost, that play a critical role in subordinating this objective.

Qsn11.

Answer B-negotiate a local version of the organization’s standards

In setting security standards, it is vital to ensure law and regulations are given priority to ensure data is highly protected against any attack that may occur (Kessler, 2016). It is vital to negotiate local versions of standards that the system will adopt.

Qsn12.

Answer C- A tailored methodology based on exposure

Different stage of the information security system requires various strategies to protect it. This must be tailored by each stage (Kessler, 2016).

References

Kessler, G. C. (2016). An Overview of Cryptography (Updated Version, 3 March 2016).

Chapple, M., Stewart, J. M., & Gibson, D. (2018). (ISC) 2 CISSP Certified Information Systems Security Professional Official Study Guide. John Wiley & Sons.

 

 

 

 

 

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask