- Cryptography is a process of hiding information by altering the actual information into different representation, for example APA can be written as I?X.
- Almost all cryptosystem depend on a key such as a password like the numbers or a phase that can be used to encrypt or decrypt a message.
- The traditional type of cryptosystem used on a computer network is called a symmetric secret key system.
- With this approach, the sender and the recipient use the same key, and they have to keep the share key a secret from anyone else.
Kavungya answered the question on May 10, 2019 at 13:32
-
Describe the natural and environmental threats.
(Solved)
Describe the natural and environmental threats.
Date posted:
May 10, 2019
.
Answers (1)
-
Describe the application controls.
(Solved)
Describe the application controls.
Date posted:
May 10, 2019
.
Answers (1)
-
Describe the administration controls.
(Solved)
Describe the administration controls.
Date posted:
May 10, 2019
.
Answers (1)
-
Describe the communication controls.
(Solved)
Describe the communication controls.
Date posted:
May 10, 2019
.
Answers (1)
-
Describe the data security controls.
(Solved)
Describe the data security controls.
Date posted:
May 10, 2019
.
Answers (1)
-
Describe the Access control.
(Solved)
Describe the Access control.
Date posted:
May 10, 2019
.
Answers (1)
-
Describe the general computer controls.
(Solved)
Describe the general computer controls.
Date posted:
May 10, 2019
.
Answers (1)
-
Explain the defense strategies implemented for computer crimes.
(Solved)
Explain the defense strategies implemented for computer crimes.
Date posted:
May 10, 2019
.
Answers (1)
-
Describe intentional threats.
(Solved)
Describe intentional threats.
Date posted:
May 10, 2019
.
Answers (1)
-
Describe Unintentional threats.
(Solved)
Describe Unintentional threats.
Date posted:
May 10, 2019
.
Answers (1)
-
Describe the database availability.
(Solved)
Describe the database availability.
Date posted:
May 10, 2019
.
Answers (1)
-
Describe the database management systems security features.
(Solved)
Describe the database management systems security features.
Date posted:
May 10, 2019
.
Answers (1)
-
Outline the database security issues.
(Solved)
Outline the database security issues.
Date posted:
May 10, 2019
.
Answers (1)
-
Describe database security.
(Solved)
Describe database security.
Date posted:
May 10, 2019
.
Answers (1)
-
State and explain the contents of a database.
(Solved)
State and explain the contents of a database.
Date posted:
May 10, 2019
.
Answers (1)
-
Explain the disadvantages of database approach.
(Solved)
Explain the disadvantages of database approach.
Date posted:
May 10, 2019
.
Answers (1)
-
State and explain the features that characterize a database approach.
(Solved)
State and explain the features that characterize a database approach.
Date posted:
May 10, 2019
.
Answers (1)
-
State and explain the Limitations of a file system.
(Solved)
State and explain the Limitations of a file system.
Date posted:
May 10, 2019
.
Answers (1)
-
Describe file systems.
(Solved)
Describe file systems.
Date posted:
May 10, 2019
.
Answers (1)
-
Describe data warehousing.
(Solved)
Describe data warehousing.
Date posted:
May 10, 2019
.
Answers (1)