Wednesday, September 25, 2019

Assignment 1 Example | Topics and Well Written Essays - 750 words - 14

1 - Assignment Example in organizing intrusion and/or misuse scenarios by: utilizing known vulnerabilities and weak system points and analyzing system dependencies and weak points and then represent these weaknesses on. Attack trees establish an intuitive model that systematically describes the possible attack scenarios on a system and therefore forms the basis for threat analysis (Ghazizadeh & Zamani, 2012). Basically, the difference is in the two techniques used for encryption i.e. symmetric and public key encryption. Both the sender and the receiver in symmetric encryption share the same key to encrypt and decrypt a message. This is achieved using the secret key. In public key encryption, the sender and the receiver both have public and a private key. The private key is known only to the person who holds and the public key is known by other users. The difference between the two keys is that the secret key is used in symmetric encryption while the private key is used in public key encryption or asymmetric encryption (Brooks, 2005). Both parties i.e. sender and the receiver hold the secret key while private key is only held by one of the parties, each party has his own private key. A private key is generated for an asymmetric encryption algorithm which is retained by the owner while the accompanying public key is open for others to use for secure communications/authentication. The priva te key isn’t shared with any person. A secret key on the other hand is a single key used in symmetric encryption algorithm and is only shared between the communicating parties and kept secret from all the others. The key must be transmitted to or shared with all parties by sue of a method outside the communication link it is intended to secure. Biometrics are defined as metrics related to human characteristics. Biometrics authentication is a form of identification and access control used to identify persons in groups under surveillance. The identifiers use unique and measurable traits to label and

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.