Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Active Tutors
Asked Questions
Answered Questions
hybrid cryptography systemsthis makes use of different cryptography systems except digital certificates pure asymmetric key encryption is not used
digital certificatesdigital certificates are electronic document having key value and identifying information about entity which controls key digital
digital signaturesdigital signatures are encrypted messages which can be proven mathematically to be authentic these are created in response to
public key infrastructure pkiit is integrated system of software encryption methodologies protocols legal agreements and 3rd-party services enabling
asymmetric encryptionasymmetric encryption method makes use of two different but related keys and either key can be used to encrypt or decrypt the
symmetric encryptionthis encryption method makes use of same ldquosecret keyrdquo to encipher and decipher the message and it is termed as private
cryptographic algorithmscryptographic algorithms are broadly classified into two broad categories they are stated below1 symmetric encryption
base liningbull organizations do not have any contact to each other bull no two organizations are identical to each
benchmarkingan alternative approach to risk management is benchmarking it is process of seeking out and studying practices in other organizations
the cost benefit analysis cba formulacba determines that whether the control alternative being evaluated is worth cost incurred to control
cost benefit analysis cbathe common approach for information security controls is economic feasibility of implementation cba is begun by evaluating
categories of controlscontrolling risk through mitigation avoidance or transference is accomplished by implementing controls there are 4 effective
risk control strategiesonce the ranked vulnerability risk worksheet has created they should choose one of following 4 strategies to control each
cipher methodsthere are 2 methods of encrypting plaintextbull bit stream method ndash every bit in the plaintext bit is transformed into a cipher bit
elements of cryptosystemscryptosystems is characteristically made up of algorithms data handling techniques and procedures which are combined in
introduction to cryptographycryptographythe word cryptography is derived from greek words kryptos which means hidden and graphein meaning to write
feasibility studiesbefore deciding on strategy all information of economic or non economic consequences of vulnerability of information asset should
access controlsaccess controls addresses admission of a user into a trusted area of organization it comprises of a combination of policies amp
identify possible controlsfor each threat and linked vulnerabilities which have residual risk create primary list of control ideas residual risk is
risk determinationfor purpose of relative risk assessment risk equals probability of vulnerability occurrence times value minus percentage risk
risk assessmentrisk assessment is a step in a risk management technique risk assessment is the determination of quantitative or qualitative value of
vulnerability identificationspecific avenues threat agents can exploit to attack an information asset are known as vulnerabilities examine how each