This topic contains a solution. Click here to go to the answer

Author Question: A __________ is created by using a secure hash function to generate a hash value for a message and ... (Read 53 times)

bb

  • Hero Member
  • *****
  • Posts: 544
A __________ is created by using a secure hash function to generate a hash value for a message and then encrypting the hash code with a private key.
 
  A. digital signature B. keystream
   C. one way hash function D. secret key

Question 2

List and briefly describe the three components of the CIA security triad.
 
  What will be an ideal response?



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
Marked as best answer by a Subject Expert

Smiles0805

  • Sr. Member
  • ****
  • Posts: 305
Answer to Question 1

A

Answer to Question 2

The CIA triad includes confidentiality, integrity, and availability. Confidentiality is the assurance of data privacy. The data or transmitted message is encrypted so that it is readable only by the person for whom it is intended. The confidentiality function prevents unauthorized disclosure of information. Integrity is the assurance that data are accurate or that a message has not been altered. It means that stored data has not been modified without authorization; a message that was sent is the same message that was received. Availability is the assurance that access to data, the Web site, or other EC data service is timely, available, reliable, and restricted to authorized users.




bb

  • Member
  • Posts: 544
Reply 2 on: Jul 7, 2018
Great answer, keep it coming :)


bimper21

  • Member
  • Posts: 309
Reply 3 on: Yesterday
Excellent

 

Did you know?

The Centers for Disease Control and Prevention (CDC) was originally known as the Communicable Disease Center, which was formed to fight malaria. It was originally headquartered in Atlanta, Georgia, since the Southern states faced the worst threat from malaria.

Did you know?

All adverse reactions are commonly charted in red ink in the patient's record and usually are noted on the front of the chart. Failure to follow correct documentation procedures may result in malpractice lawsuits.

Did you know?

Bacteria have flourished on the earth for over three billion years. They were the first life forms on the planet.

Did you know?

Opium has influenced much of the world's most popular literature. The following authors were all opium users, of varying degrees: Lewis Carroll, Charles, Dickens, Arthur Conan Doyle, and Oscar Wilde.

Did you know?

The immune system needs 9.5 hours of sleep in total darkness to recharge completely.

For a complete list of videos, visit our video library