1.Explain how encryption can be used to provide confidentiality, integrity, auth
ID: 3719472 • Letter: 1
Question
1.Explain how encryption can be used to provide confidentiality, integrity, authenticity, and non-repudiation.
2.What is digital signature? Describe the signing and verifying process.
3.What does a packet sniffer do? Why can sniffers be dangerous? Give an example of sniffer software.
4.What is port scanning? What kind of information can be obtained from port scanning? Give an example of port scanning tools.
5.What is the function of ping command? What is ping floods? How to prevent it?
6.What is a SYN flood attack? How does it abuse the TCP three-way handshake?
7.List three security improvement for DNS attacks.
8.What is a DoS attack? What is DDoS attack? Describe the roles of botnets in DDoS attack.
9.How does IPsec protect the contents in transmission?
10.What is the function of IKE protocol? Give an example of application where IKE is used.
Explanation / Answer
Answer 2:
A digital signature (not to be mistaken for a digital authentication) is a mathematical method used to approve the authenticity and respectability of a message, programming or digital report.
What might as well be called a handwritten signature or stamped seal, yet offering much more innate security, a digital signature is expected to take care of the issue of altering and pantomime in digital correspondences. Digital signatures can give the additional affirmations of confirmation to starting point, character and status of an electronic report, exchange or message, and additionally recognizing educated assent by the endorser.
Applying the Signature
1. When you click "sign", a one of a kind digital unique mark (called a hash) of the report is made utilizing a mathematical calculation. This hash is speicifc to this specific report; even the scarcest change would bring about an alternate hash.
2. The hash is encoded utilizing the endorser's private key. The encoded hash and the underwriter's open key are consolidated into a digital signature, which is attached to the report.
3. The digitally marked archive is prepared for dispersion.
Verifying the Signature
1. When you open the record in a digital signature-skilled program (e.g., Adobe Reader, Microsoft Office), the program naturally utilizes the underwriter's open key (which was incorporated into the digital signature with the report) to decode the archive hash.
2. The program figures another hash for the record. On the off chance that this new hash coordinates the unscrambled hash from Step 1, the program knows the record has not been changed and shows informing alone the lines of, "The report has not been altered since this signature was connected."
DEAR PLEASE DO RATE IT IF HELPS ELSE LET ME KNOW YOUR DOUBT.
THANK YOU!!!
PLEASE POST SEPARATELY , WE ARE ALLOWED TO ANSWER A SINGLE QUESTION FROM MULTIPLE POSTED QUESTIONS.
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.