COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

CRYPTOGRAPHY AND ENCRYPTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Public keys can be stored by embedding them within digital certificates, while private keys can be stored on the user’s local system.
A
True
B
False
C
Either A or B
D
None of the above
Explanation: 

Detailed explanation-1: -Public keys can be stored by embedding them within digital certificates, while private keys can be stored on the user’s local system. The vulnerability discovered in IPsec in early 2014 was nicknamed Heartbleed, due to an issue with a heartbeat extension in the protocol.

Detailed explanation-2: -Asymmetric encryption uses a mathematically related pair of keys for encryption and decryption: a public key and a private key. If the public key is used for encryption, then the related private key is used for decryption. If the private key is used for encryption, then the related public key is used for decryption.

Detailed explanation-3: -The private key only decrypts the data while the public key only encrypts the data. Both keys are mathematically related.

Detailed explanation-4: -Transport Layer Security/Secure Socket Layer (TLS/SSL) certificates. On the server, TLS/SSL certificates are installed. Such certificates aim to guarantee that all client-server communications are secret and encrypted.

Detailed explanation-5: -Checksums are used for applications such as the following: File integrity preservation. Cryptographic checksums help prevent unauthorized access and data manipulation. While version control systems serve a similar function, checksums are considered more effective and secure.

There is 1 question to complete.