This topic contains a solution. Click here to go to the answer

Author Question: X.800 divides security services into five categories: authentication, access control, ... (Read 48 times)

elizabeth18

  • Hero Member
  • *****
  • Posts: 559
X.800 divides security services into five categories: authentication, access control, nonrepudiation, data integrity and __________ .
 
  What will be an ideal response?

Question 2

The common technique for masking contents of messages or other information traffic so that opponents, even if they captured the message, could not extract the information from the message is _________ .
 
  What will be an ideal response?



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
Marked as best answer by a Subject Expert

BUTTHOL369

  • Sr. Member
  • ****
  • Posts: 341
Answer to Question 1

DATA CONFIDENTIALITY

Answer to Question 2

ENCRYPTION




elizabeth18

  • Member
  • Posts: 559
Reply 2 on: Jul 7, 2018
Wow, this really help


deja

  • Member
  • Posts: 332
Reply 3 on: Yesterday
Excellent

 

Did you know?

More than 150,000 Americans killed by cardiovascular disease are younger than the age of 65 years.

Did you know?

Critical care patients are twice as likely to receive the wrong medication. Of these errors, 20% are life-threatening, and 42% require additional life-sustaining treatments.

Did you know?

Vaccines cause herd immunity. If the majority of people in a community have been vaccinated against a disease, an unvaccinated person is less likely to get the disease since others are less likely to become sick from it and spread the disease.

Did you know?

Russia has the highest death rate from cardiovascular disease followed by the Ukraine, Romania, Hungary, and Poland.

Did you know?

Nitroglycerin is used to alleviate various heart-related conditions, and it is also the chief component of dynamite (but mixed in a solid clay base to stabilize it).

For a complete list of videos, visit our video library