COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

CRYPTOGRAPHY AND ENCRYPTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
This is the information cannot be altered in storage or transit between sender and intended receiver without the alteration being detected.
A
Authentication
B
Non-repudiation
C
Integrity
D
Confidentiality
Explanation: 

Detailed explanation-1: -Modern cryptography concerns itself with the following four objectives: Confidentiality. The information cannot be understood by anyone for whom it was unintended. Integrity.The information cannot be altered in storage or transit between sender and intended receiver without the alteration being detected.

Detailed explanation-2: -Hashing uses a secret key to create a message digest, which is a combination of the message itself and the hash result. The message digest is sent to the recipient, and the same key is applied to it. The recipient applies the same key to the message, and the result will be identical if there has been no alteration.

Detailed explanation-3: -Cryptography is the study of secure communications techniques that allow only the sender and intended recipient of a message to view its contents. The term is derived from the Greek word kryptos, which means hidden.

Detailed explanation-4: -Data encryption is the process of converting data from a readable format to a scrambled piece of information. This is done to prevent prying eyes from reading confidential data in transit. Encryption can be applied to documents, files, messages, or any other form of communication over a network.

Detailed explanation-5: -MAC technique does not provide a non-repudiation service. If the sender and receiver get involved in a dispute over message origination, MACs cannot provide a proof that a message was indeed sent by the sender.

There is 1 question to complete.