Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

1. When it comes to information security versus information reliability, what is

ID: 3581571 • Letter: 1

Question

1. When it comes to information security versus information reliability, what is the information theory related to, and what does it give us in terms of abilities?

2. How does information look like after applying a confidentiality measure, such as encryption, or integrity measure, such as hash.

3. What is the difference between secret key and two-key ciphers in terms of performance and key management?

4. What is a collision in terms of hash algorithms?

5. How does an attack on confidentiality or integrity occur?

6. Examples of common encryption and hash algorithms 3DES, AES, MD5, SHA-1

7. What are examples of attacks on availability?

8. What is the purpose of backups, redundancy, and honeypot? Availability provisioning

Explanation / Answer

4.What is a collision in terms of hash algorithms?

A collision or conflict occur when two unlike inputs to a purpose, typically one used to condense large data items into a lesser or fixed size, construct the same productivity, called depending on the application a hash value, checksum, fingerprint, or process.

7.What are examples of attacks on availability?

Examples of Attacks on Availability

1. By extortionists and business rivals

2. On websites of banking and financial companies, online gambling firms, web retailers, government, etc.

3. These can be done by Denial-of-Service, Distributed Denial-of-Service Attack, DDoS Attack Models