Friday, June 14, 2019
Assignment 1 Example | Topics and Well Written Essays - 750 words - 14
1 - Assignment Examplein organizing intrusion and/or misuse scenarios by utilizing known vulnerabilities and weak system points and analyzing system dependencies and weak points and then represent these weaknesses on. Attack trees establish an intuitive model that systematically describes the possible attack scenarios on a system and therefore forms the basis for threat analysis (Ghazizadeh & Zamani, 2012).Basically, the difference is in the two techniques used for encryption i.e. symmetric and normal see encryption. both(prenominal) the sender and the receiver in symmetric encryption share the same chance on to encrypt and decrypt a message. This is achieved using the secret key. In public key encryption, the sender and the receiver both have public and a private key. The private key is known only to the person who holds and the public key is known by other users. The difference between the two keys is that the secret key is used in symmetric encryption eyepatch the private key is used in public key encryption or asymmetric encryption (Brooks, 2005). Both parties i.e. sender and the receiver hold the secret key while private key is only held by one of the parties, each party has his own private key. A private key is generated for an asymmetric encryption algorithmic program which is retained by the owner while the accompanying public key is open for others to use for secure communications/authentication. The private key isnt divided up with any person. A secret key on the other hand is a single key used in symmetric encryption algorithm and is only shared between the communicating parties and kept secret from all the others. The key must be transmitted to or shared with all parties by sue of a method outside the communication link it is intended to secure.biometry are defined as metrics related to human characteristics. Biometrics authentication is a form of identification and access control used to identify persons in groups under surveillance. The iden tifiers use unique and measurable traits to label and
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.