COMPUTER ETHICS AND SECURITY
CRYPTOGRAPHY AND ENCRYPTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Confidentiality
|
|
Integrity
|
|
Origin authentication
|
|
Non-repudiation
|
Detailed explanation-1: -Nonrepudiation is achieved through cryptography, like digital signatures, and includes other services for authentication, auditing and logging. In online transactions, digital signatures ensure that a party cannot later deny sending information or deny the authenticity of its signature.
Detailed explanation-2: -MD5 Message Digest Algorithm, or MD5, is a cryptographic hashing function. It is a part of the Message Digest Algorithm family which was created to verify the integrity of any message or file that is hashed. MD5 is still used in a few cases; however, MD5 is insecure and should not be used in any application.
Detailed explanation-3: -When a cryptographic system is used to protect data confidentiality, what actually takes place? Unauthorized users are prevented from viewing or accessing the resource.
Detailed explanation-4: -SCADA system gathers the data from various electrical substations and correspondingly process it. PLCs in substations continuously monitor the substation components and corresponding transmits that to the central system.