please help, with explanations Use a matrix format to show the relationship betw
ID: 660626 • Letter: P
Question
please help, with explanations
Use a matrix format to show the relationship between X.800 security services and security mechanisms attacks. The matrix columns correspond to mechanisms and the matrix rows correspond to services.
Encipherment
Digital Signature
Access Control
Data Integrity
Authentication Exchange
Traffic Padding
Routing Control
Notarization
Peer Entity Authentication
Data Origin Authentication
Access Control
Confidentiality
Traffic Flow Confidentiality
Data Integrity
Non-Repudiation
Availability
Use a matrix format to show the relationship between X.800 security services and network security attacks. The matrix columns correspond to attacks and the matrix rows correspond to services.
Release of Message Contents
Traffic Analysis
Masquerade
Replay
Modification of Messages
Denial of Service
Peer Entity Authentication
Data Origin Authentication
Access Control
Confidentiality
Traffic Flow Confidentiality
Data Integrity
Non-Repudiation
Availability
Encipherment
Digital Signature
Access Control
Data Integrity
Authentication Exchange
Traffic Padding
Routing Control
Notarization
Peer Entity Authentication
Data Origin Authentication
Access Control
Confidentiality
Traffic Flow Confidentiality
Data Integrity
Non-Repudiation
Availability
Explanation / Answer
Encipherment
Digital Signature
Access Control
Data Integrity
Authentication Exchange
Traffic Padding
Routing Control
Notarization
Release of Message Contents
Traffic Analysis
Masquerade
Replay
Modification of Messages
Denial of Service
Peer Entity Authentication
y
y
y
y
Data Origin Authentication
y
y
y
y
Access Control
y
y
y
Confidentiality
y
y
y
Traffic Flow Confidentiality
y
y
y
y
Data Integrity
y
y
y
y
Non-Repudiation
y
y
y
y
Availability
Y
y
y
y
1)Peer Entity Authentication : since authentication is done between peers so encipherment digital signature authentication and dos are accepted.
2)Data Origin Authentication: to send data
Encipherment
Digital Signature
Access Control
Data Integrity
Authentication Exchange
Traffic Padding
Routing Control
Notarization
Release of Message Contents
Traffic Analysis
Masquerade
Replay
Modification of Messages
Denial of Service
Peer Entity Authentication
y
y
y
y
Data Origin Authentication
y
y
y
y
Access Control
y
y
y
Confidentiality
y
y
y
Traffic Flow Confidentiality
y
y
y
y
Data Integrity
y
y
y
y
Non-Repudiation
y
y
y
y
Availability
Y
y
y
y
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.