Provide an example of at least one application (if there are any such applicatio
ID: 3875368 • Letter: P
Question
Provide an example of at least one application (if there are any such applications) where:
(a) data integrity is more important than data confidentiality;
(b) entity authentication is more important than data origin authentication;
(c) entity authentication and data origin authentication are both required;
(d) data origin authentication is necessary but non-repudiation is not necessarily required;
(e) data integrity is required but not data origin authentication;
(f) data origin authentication is required but not data integrity;
(g) entity authentication is provided using more than one mechanism.
Explanation / Answer
a) Bank transactions and election results are few places where data integrity is much more needed than confidentiality.
b) Cryptography or encryption of data is entity authentication, which is more important than the origin of data.
c) Passwords, Biometrics or ATM cards and pins
d) This hapens in applications where there are two processes running as the same user. TCP sockets on localhost help them to communicate with each other. It is necessary to identity the peer to avoid local restrictions or collisions. Thus, non-repudiation is not necessarily required.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.