1. When it comes to information security versus information reliability, what is
ID: 3581571 • Letter: 1
Question
1. When it comes to information security versus information reliability, what is the information theory related to, and what does it give us in terms of abilities?
2. How does information look like after applying a confidentiality measure, such as encryption, or integrity measure, such as hash.
3. What is the difference between secret key and two-key ciphers in terms of performance and key management?
4. What is a collision in terms of hash algorithms?
5. How does an attack on confidentiality or integrity occur?
6. Examples of common encryption and hash algorithms 3DES, AES, MD5, SHA-1
7. What are examples of attacks on availability?
8. What is the purpose of backups, redundancy, and honeypot? Availability provisioning
Explanation / Answer
4.What is a collision in terms of hash algorithms?
A collision or conflict occur when two unlike inputs to a purpose, typically one used to condense large data items into a lesser or fixed size, construct the same productivity, called depending on the application a hash value, checksum, fingerprint, or process.
7.What are examples of attacks on availability?
Examples of Attacks on Availability
1. By extortionists and business rivals
2. On websites of banking and financial companies, online gambling firms, web retailers, government, etc.
3. These can be done by Denial-of-Service, Distributed Denial-of-Service Attack, DDoS Attack Models
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.