COMPUTER THREATS SECURITY
TYPES OF COMPUTER SECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Symmetric encryption
|
|
Encryption doesn’t exist!
|
|
Asymmetric encryption
|
|
Same-key encryption
|
Detailed explanation-1: -Symmetric encryption uses one key to encrypt and decrypt. If you encrypt a zip file, and then decrypt with the same key, you are using symmetric encryption. Symmetric encryption is also called “secret key” encryption, as the key must be kept secret from third parties.
Detailed explanation-2: -Symmetric encryption uses the same key to perform both encryption and decryption functions. Symmetric encryption uses a shared private key while asymmetric encryption uses a public/private key pair.
Detailed explanation-3: -The sender uses a public key to encrypt the message. The recipient uses its private key to decrypt the message. Public key infrastructure (PKI) is a set of hardware, software, organizations, and policies to public key encryption work on the Internet.
Detailed explanation-4: -Symmetric vs Asymmetric Encryption Symmetric encryption uses a unique key that must be shared between the people who need to receive the message, while asymmetric encryption uses a pair of public keys and a private key to encrypt and decrypt messages when they are communicated.