This topic contains a solution. Click here to go to the answer

Author Question: X.800 divides security services into five categories: authentication, access control, ... (Read 42 times)

elizabeth18

  • Hero Member
  • *****
  • Posts: 559
X.800 divides security services into five categories: authentication, access control, nonrepudiation, data integrity and __________ .
 
  What will be an ideal response?

Question 2

The common technique for masking contents of messages or other information traffic so that opponents, even if they captured the message, could not extract the information from the message is _________ .
 
  What will be an ideal response?



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
Marked as best answer by a Subject Expert

BUTTHOL369

  • Sr. Member
  • ****
  • Posts: 341
Answer to Question 1

DATA CONFIDENTIALITY

Answer to Question 2

ENCRYPTION




elizabeth18

  • Member
  • Posts: 559
Reply 2 on: Jul 7, 2018
Excellent


6ana001

  • Member
  • Posts: 311
Reply 3 on: Yesterday
Great answer, keep it coming :)

 

Did you know?

Limit intake of red meat and dairy products made with whole milk. Choose skim milk, low-fat or fat-free dairy products. Limit fried food. Use healthy oils when cooking.

Did you know?

It is important to read food labels and choose foods with low cholesterol and saturated trans fat. You should limit saturated fat to no higher than 6% of daily calories.

Did you know?

About 3% of all pregnant women will give birth to twins, which is an increase in rate of nearly 60% since the early 1980s.

Did you know?

Your chance of developing a kidney stone is 1 in 10. In recent years, approximately 3.7 million people in the United States were diagnosed with a kidney disease.

Did you know?

About 600,000 particles of skin are shed every hour by each human. If you live to age 70 years, you have shed 105 pounds of dead skin.

For a complete list of videos, visit our video library