This topic contains a solution. Click here to go to the answer

Author Question: X.800 divides security services into five categories: authentication, access control, ... (Read 132 times)

elizabeth18

  • Hero Member
  • *****
  • Posts: 559
X.800 divides security services into five categories: authentication, access control, nonrepudiation, data integrity and __________ .
 
  What will be an ideal response?

Question 2

The common technique for masking contents of messages or other information traffic so that opponents, even if they captured the message, could not extract the information from the message is _________ .
 
  What will be an ideal response?



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
Marked as best answer by a Subject Expert

BUTTHOL369

  • Sr. Member
  • ****
  • Posts: 341
Answer to Question 1

DATA CONFIDENTIALITY

Answer to Question 2

ENCRYPTION




elizabeth18

  • Member
  • Posts: 559
Reply 2 on: Jul 7, 2018
:D TYSM


nyrave

  • Member
  • Posts: 344
Reply 3 on: Yesterday
Thanks for the timely response, appreciate it

 

Did you know?

The term pharmacology is derived from the Greek words pharmakon("claim, medicine, poison, or remedy") and logos ("study").

Did you know?

Long-term mental and physical effects from substance abuse include: paranoia, psychosis, immune deficiencies, and organ damage.

Did you know?

The first oral chemotherapy drug for colon cancer was approved by FDA in 2001.

Did you know?

For pediatric patients, intravenous fluids are the most commonly cited products involved in medication errors that are reported to the USP.

Did you know?

Patients should never assume they are being given the appropriate drugs. They should make sure they know which drugs are being prescribed, and always double-check that the drugs received match the prescription.

For a complete list of videos, visit our video library