COMPUTER ETHICS AND SECURITY
ETHICS IN COMPUTING
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Communication and Multimedia Act 1998
|
|
Copyright (Amendment) Act 1997
|
|
Computer Crimes Act 1997
|
|
Digital Signature Act 1997
|
Detailed explanation-1: -Share to Facebook Share to Twitter. Definition(s): A cryptographic key that is used with an asymmetric (public key) cryptographic algorithm and is associated with a public key. The private key is uniquely associated with the owner and is not made public.
Detailed explanation-2: -Public and private keys In cryptography, a key is a value used with an algorithm to encrypt and/or decrypt data. A private key, also known as a secret key, is kept on its owner’s system and never transmitted publicly. A public key, as the name implies, is openly available to anyone who wants it.
Detailed explanation-3: -2 under Public-key certificate. A digital document issued and digitally signed by the private key of a certificate authority that binds an identifier to a subscriber to a public key. The certificate indicates that the subscriber identified in the certificate has sole control and access to the private key.