COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

CRYPTOGRAPHY AND ENCRYPTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Protecting data by hashing the data with a hashing function addresses which part(s) of the CIA triad?
A
Confidentiality only
B
Integrity only
C
Availability only
D
Confidentiality and Integrity
Explanation: 

Detailed explanation-1: -While encryption is meant to guarantee data confidentiality, some modern encryption algorithms employ additional strategies to also guarantee data integrity (sometimes by means of embedded hashing algorithms) as well as authenticity.

Detailed explanation-2: -Encryption takes plain text, like a text message or email, and scrambles it into an unreadable format-called “cipher text.” This helps protect the confidentiality of digital data either stored on computer systems or transmitted through a network like the Internet.

Detailed explanation-3: -Most attacks on hash functions involve: Finding collisions, injecting a new hash function into the code, pre-generating millions of hashes and comparing them to the plain text that generated it.

Detailed explanation-4: -Encryption is a modern form of cryptography that allows a user to hide information from others. Encryption uses a complex algorithm called a cipher to turn regular data (known as plaintext) into a series of seemingly random characters (known as ciphertext) unreadable by those without a special key to decrypt it.

There is 1 question to complete.