This topic contains a solution. Click here to go to the answer

Author Question: X.800 divides security services into five categories: authentication, access control, ... (Read 148 times)

elizabeth18

  • Hero Member
  • *****
  • Posts: 559
X.800 divides security services into five categories: authentication, access control, nonrepudiation, data integrity and __________ .
 
  What will be an ideal response?

Question 2

The common technique for masking contents of messages or other information traffic so that opponents, even if they captured the message, could not extract the information from the message is _________ .
 
  What will be an ideal response?



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
Marked as best answer by a Subject Expert

BUTTHOL369

  • Sr. Member
  • ****
  • Posts: 341
Answer to Question 1

DATA CONFIDENTIALITY

Answer to Question 2

ENCRYPTION




elizabeth18

  • Member
  • Posts: 559
Reply 2 on: Jul 7, 2018
Gracias!


peter

  • Member
  • Posts: 330
Reply 3 on: Yesterday
YES! Correct, THANKS for helping me on my review

 

Did you know?

Oliver Wendell Holmes is credited with introducing the words "anesthesia" and "anesthetic" into the English language in 1846.

Did you know?

Nearly all drugs pass into human breast milk. How often a drug is taken influences the amount of drug that will pass into the milk. Medications taken 30 to 60 minutes before breastfeeding are likely to be at peak blood levels when the baby is nursing.

Did you know?

In the United States, there is a birth every 8 seconds, according to the U.S. Census Bureau's Population Clock.

Did you know?

Stroke kills people from all ethnic backgrounds, but the people at highest risk for fatal strokes are: black men, black women, Asian men, white men, and white women.

Did you know?

Your heart beats over 36 million times a year.

For a complete list of videos, visit our video library