Questions in Information technology and security

User Generated

ybpb_02

Computer Science

Description

Need help with some information security questions. Please find attached. Thank you

Unformatted Attachment Preview

Information system security 1. Describe cryptography in layman's terms. 2. What is PGP and how difficult is it to install/use? 3. What is the future of PKI? Acceptance of PKI solutions—and product sales—has fallen short of early estimates. What would the “killer app” for PKI sales look like? 4. Will biometrics involve encryption? How are biometric technologies dependent on the use of cryptography?
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Good luck in your study and if you need any further help in your
assignments, please let me know 

Can you please confirm if you have received the work? Once
again, thanks for allowing me to help you

R STUDYPOOL NO OUTLINE IS NEEDED HERE

Running Head: INFORMATION SYSTEM SECURITY

Information System Security
Name
Class number
Assignment number
Instructor
Date

1

INFORMATION SYSTEM SECURITY

2

1. Cryptography is the practice of securing communications so that, in case they are
intercepted, the adversaries do not read the content of the messages. It uses mathematics
and science for data encryption and decryption. Cryptography allows for private
communications by safeguarding the integrity of the information in transit. Currently,
cryptography's use in IT lies in confirmation and non-repudiation. Information such login
information in computers is encrypted so that, any unintended party who comes across
the information would not decipher it without a key. It makes it possible for two or more
parties to communicate over public networks without the risk of compromise. In
layman’s language, cryptography is a private communication, on an open platform.
Consider a locker in a public locker room. Cryptography is the specific key to that
particular locker, whereby access to the locker is only granted to those who have the
specific key to that locker.
2. Pretty Good Encryption (PGP) is a program for encryption that uses both a public and
a private key for encryption and decryption respectively. With a public key, it solves the
dilemma of key distribution. It is a 1991 creation by Phil Zimmerman. It is well-known
for its simplicity and use, as well as effective...


Anonymous
Nice! Really impressed with the quality.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags