Free Essay

Is4560 Unit 2 Assignment 1

In:

Submitted By ShaunH4
Words 273
Pages 2
Shaun Howard
IS4560 – Hacking and Countermeasures
Unit 2 Assignment 1
September 30, 2014

1. _________ type of certificate is used to provide security on Web sites. a. SSL 2. __________ is the most common public key encryption systems and, in most cases, this relies on manual trust and key distribution. b. PKI 3. __________ provides authentication or proves integrity of a digital message. c. MAC 4. ___________ encryption scheme was broken and was replaced with a third round version of itself. d. 3DES 5. _________ is the first algorithm suited to both signing and encryption, and it is now widely used in e-commerce and other public key systems. e. RSA 6. The entity that issues certificates is a __________. f. Certificate Authority 7. The document to check to verify whether a certificate has been revoked is __________. g. CRL 8. Each bit of length _______the number of keys. h. Increases 9. Currently, _______ bit certificates are commonly used for web communications. i. 128 10. Triple DES provides ________ bits of security, despite using a 168 bit key. j. 112 11. Thawte, Verisign, and Comodo are all examples of _____________. k. SSL Certificate Providers 12. Hiding data in images is an example of ____________. l. Steganography

13. Data Encryption Standard (DES), ROT13, and Enigma are all examples of ______________. m. Cryptography 14. A digitally signed email provides _____________. n. Asymmetric Encryption 15. A digitally encrypted e-mail provides ___________.
Public Key Cryptography

Works Cited
Oriyano, S.-P., & Gregg, M. (2011). Hacker Techniques, Tools, and Incident Handling (ITT Technical Institute Edition ed., Vol. 1). Burlington, WI, USA: Jones & Bartlett Learning, LLC.

Similar Documents

Premium Essay

Test

...Windows platforms and applications. Areas of study include analysis of the security architecture of Windows systems. Students will identify and examine security risks and apply tools and methods to address security issues in the Windows environment. Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program:    IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA    NT2580 NT2670  Introduction to  Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to  Security Auditing for Compliance Countermeasures Information Security Email and Web Services      NT1230 NT1330 Client-Server Client-Server  Networking I Networking II  IS3230 IS3350 NT1230 NT1330  Issues Client-Server Client-Server  SecurityContext in Legal Access Security Networking I Networking II   NT1110  NT1210 Structure and Introduction to  ComputerLogic Networking    IS3120 IS3110 NT1210 Network  Risk Management in Introduction to General Education / General Studies NT2580 NT2799 Communications Information Technology Introduction to Information Security NSANetworking Capstone Project IS4550 NT2640 Security Policies and Implementation IP NT2640...

Words: 2305 - Pages: 10