COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

CRYPTOGRAPHY AND ENCRYPTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
What are the examples of weak/deprecated cryptographic solutions?Choose all that apply.
A
WEP
B
AES
C
SSL
D
DES
E
PGP
Explanation: 

Detailed explanation-1: -Encryption algorithms such as TripleDES and hashing algorithms such as SHA1 and RIPEMD160 are considered to be weak. These cryptographic algorithms do not provide as much security assurance as more modern counterparts.

Detailed explanation-2: -A weak cipher is defined as an encryption/decryption algorithm that uses a key of insufficient length. Using an insufficient length for a key in an encryption/decryption algorithm opens up the possibility (or probability) that the encryption scheme could be broken (i.e. cracked).

Detailed explanation-3: -Scenario #1: An application encrypts credit card numbers in a database using automatic database encryption. Scenario #2: A site doesn’t use or enforce TLS for all pages or supports weak encryption. Scenario #3: The password database uses unsalted or simple hashes to store everyone’s passwords.

Detailed explanation-4: -Transmitting secret data in plain text. Use of old/less-secure algorithm. Use of a hard-coded password in config files. Improper cryptographic key management. Insufficient randomness for cryptographic functions. Missing encryption. More items •07-Jun-2022

There is 1 question to complete.