This topic contains a solution. Click here to go to the answer

Author Question: X.800 divides security services into five categories: authentication, access control, ... (Read 88 times)

elizabeth18

  • Hero Member
  • *****
  • Posts: 559
X.800 divides security services into five categories: authentication, access control, nonrepudiation, data integrity and __________ .
 
  What will be an ideal response?

Question 2

The common technique for masking contents of messages or other information traffic so that opponents, even if they captured the message, could not extract the information from the message is _________ .
 
  What will be an ideal response?



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
Marked as best answer by a Subject Expert

BUTTHOL369

  • Sr. Member
  • ****
  • Posts: 341
Answer to Question 1

DATA CONFIDENTIALITY

Answer to Question 2

ENCRYPTION




elizabeth18

  • Member
  • Posts: 559
Reply 2 on: Jul 7, 2018
Great answer, keep it coming :)


Mochi

  • Member
  • Posts: 300
Reply 3 on: Yesterday
Thanks for the timely response, appreciate it

 

Did you know?

There are 20 feet of blood vessels in each square inch of human skin.

Did you know?

About 3.2 billion people, nearly half the world population, are at risk for malaria. In 2015, there are about 214 million malaria cases and an estimated 438,000 malaria deaths.

Did you know?

It is widely believed that giving a daily oral dose of aspirin to heart attack patients improves their chances of survival because the aspirin blocks the formation of new blood clots.

Did you know?

The most common treatment options for addiction include psychotherapy, support groups, and individual counseling.

Did you know?

About 600,000 particles of skin are shed every hour by each human. If you live to age 70 years, you have shed 105 pounds of dead skin.

For a complete list of videos, visit our video library