This topic contains a solution. Click here to go to the answer

Author Question: A __________ is created by using a secure hash function to generate a hash value for a message and ... (Read 50 times)

bb

  • Hero Member
  • *****
  • Posts: 544
A __________ is created by using a secure hash function to generate a hash value for a message and then encrypting the hash code with a private key.
 
  A. digital signature B. keystream
   C. one way hash function D. secret key

Question 2

List and briefly describe the three components of the CIA security triad.
 
  What will be an ideal response?



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
Marked as best answer by a Subject Expert

Smiles0805

  • Sr. Member
  • ****
  • Posts: 305
Answer to Question 1

A

Answer to Question 2

The CIA triad includes confidentiality, integrity, and availability. Confidentiality is the assurance of data privacy. The data or transmitted message is encrypted so that it is readable only by the person for whom it is intended. The confidentiality function prevents unauthorized disclosure of information. Integrity is the assurance that data are accurate or that a message has not been altered. It means that stored data has not been modified without authorization; a message that was sent is the same message that was received. Availability is the assurance that access to data, the Web site, or other EC data service is timely, available, reliable, and restricted to authorized users.




bb

  • Member
  • Posts: 544
Reply 2 on: Jul 7, 2018
:D TYSM


chjcharjto14

  • Member
  • Posts: 342
Reply 3 on: Yesterday
Great answer, keep it coming :)

 

Did you know?

People with high total cholesterol have about two times the risk for heart disease as people with ideal levels.

Did you know?

Medication errors are three times higher among children and infants than with adults.

Did you know?

It is difficult to obtain enough calcium without consuming milk or other dairy foods.

Did you know?

In 1844, Charles Goodyear obtained the first patent for a rubber condom.

Did you know?

Computer programs are available that crosscheck a new drug's possible trade name with all other trade names currently available. These programs detect dangerous similarities between names and alert the manufacturer of the drug.

For a complete list of videos, visit our video library